ffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:49:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xb, 0x3) 10:49:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xb00, 0x3) 10:49:37 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000001) (fail_nth: 5) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:49:37 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:49:37 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0x49f, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2154.341854] FAULT_INJECTION: forcing a failure. [ 2154.341854] name failslab, interval 1, probability 0, space 0, times 0 [ 2154.343577] CPU: 0 PID: 24133 Comm: syz-executor.4 Not tainted 5.10.244 #1 [ 2154.344471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2154.345589] Call Trace: [ 2154.345945] dump_stack+0x107/0x167 [ 2154.346434] should_fail.cold+0x5/0xa [ 2154.346949] ? create_object.isra.0+0x3a/0xa30 [ 2154.347578] should_failslab+0x5/0x20 [ 2154.348080] kmem_cache_alloc+0x5b/0x310 [ 2154.348626] create_object.isra.0+0x3a/0xa30 [ 2154.349278] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2154.350091] __kmalloc+0x16e/0x390 [ 2154.350560] alloc_pipe_info+0x1e5/0x590 [ 2154.351133] splice_direct_to_actor+0x774/0x980 [ 2154.351748] ? _cond_resched+0x10/0x30 [ 2154.352264] ? inode_security+0x107/0x140 [ 2154.352810] ? pipe_to_sendpage+0x380/0x380 [ 2154.353392] ? avc_policy_seqno+0x9/0x70 [ 2154.353915] ? selinux_file_permission+0x92/0x520 [ 2154.354555] ? do_splice_to+0x160/0x160 [ 2154.355081] ? security_file_permission+0xb1/0xe0 [ 2154.355706] do_splice_direct+0x1c4/0x290 [ 2154.356254] ? splice_direct_to_actor+0x980/0x980 [ 2154.356880] ? avc_policy_seqno+0x9/0x70 [ 2154.357404] ? security_file_permission+0xb1/0xe0 [ 2154.358027] do_sendfile+0x553/0x11e0 [ 2154.358522] ? do_pwritev+0x270/0x270 [ 2154.359017] __x64_sys_sendfile64+0x149/0x210 [ 2154.359587] ? __ia32_sys_sendfile+0x220/0x220 [ 2154.360174] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2154.360850] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2154.361511] do_syscall_64+0x33/0x40 [ 2154.361988] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2154.362639] RIP: 0033:0x7fc37ea3eb19 [ 2154.363128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2154.365486] RSP: 002b:00007fc37bfb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2154.366460] RAX: ffffffffffffffda RBX: 00007fc37eb51f60 RCX: 00007fc37ea3eb19 [ 2154.367368] RDX: 0000000020000040 RSI: 0000000000000005 RDI: 0000000000000006 [ 2154.368278] RBP: 00007fc37bfb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2154.369195] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2154.370108] R13: 00007fff01b7d24f R14: 00007fc37bfb4300 R15: 0000000000022000 [ 2154.376130] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:49:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x110, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0xfb, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7"]}]}, 0x110}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2154.438122] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24157 comm=syz-executor.0 [ 2154.443120] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2154.465210] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24196 comm=syz-executor.7 [ 2154.473989] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:49:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:49:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x40000, 0x3) 10:49:37 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2154.579816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24324 comm=syz-executor.0 10:49:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x118, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x103, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4d"]}]}, 0x118}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:49:53 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0x870, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:49:53 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:49:53 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:49:53 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000001) (fail_nth: 6) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:49:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:49:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x100000, 0x3) 10:49:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xc, 0x3) [ 2170.554202] FAULT_INJECTION: forcing a failure. [ 2170.554202] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2170.556259] CPU: 1 PID: 24520 Comm: syz-executor.4 Not tainted 5.10.244 #1 [ 2170.557233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2170.558396] Call Trace: [ 2170.558768] dump_stack+0x107/0x167 [ 2170.559272] should_fail.cold+0x5/0xa [ 2170.559803] __alloc_pages_nodemask+0x182/0x600 [ 2170.560454] ? __lock_acquire+0xbb1/0x5b00 [ 2170.561051] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 2170.561907] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2170.562640] alloc_pages_current+0x187/0x280 [ 2170.563262] push_pipe+0x2b5/0x6d0 [ 2170.563760] _copy_to_iter+0x509/0x12d0 [ 2170.564310] ? __virt_addr_valid+0x346/0x5d0 [ 2170.564932] ? lock_downgrade+0x6d0/0x6d0 [ 2170.565524] ? stack_trace_save+0x8c/0xc0 [ 2170.566115] ? stack_trace_consume_entry+0x160/0x160 [ 2170.566822] ? _copy_from_iter_nocache+0xd60/0xd60 [ 2170.567511] ? __check_object_size+0x319/0x440 [ 2170.568150] seq_read_iter+0x71a/0x12b0 [ 2170.568683] proc_reg_read_iter+0x117/0x2e0 [ 2170.569190] generic_file_splice_read+0x455/0x6d0 [ 2170.569833] ? pipe_to_user+0x170/0x170 [ 2170.570317] ? fsnotify_perm.part.0+0x22d/0x620 [ 2170.570854] ? security_file_permission+0xb1/0xe0 [ 2170.571432] ? pipe_to_user+0x170/0x170 [ 2170.571950] do_splice_to+0x10e/0x160 [ 2170.572407] splice_direct_to_actor+0x2fe/0x980 [ 2170.573037] ? pipe_to_sendpage+0x380/0x380 [ 2170.573547] ? do_splice_to+0x160/0x160 [ 2170.573988] ? security_file_permission+0xb1/0xe0 [ 2170.574555] do_splice_direct+0x1c4/0x290 [ 2170.575018] ? splice_direct_to_actor+0x980/0x980 [ 2170.575572] ? avc_policy_seqno+0x9/0x70 [ 2170.576043] ? security_file_permission+0xb1/0xe0 [ 2170.576614] do_sendfile+0x553/0x11e0 [ 2170.577084] ? do_pwritev+0x270/0x270 [ 2170.577517] __x64_sys_sendfile64+0x149/0x210 [ 2170.578042] ? __ia32_sys_sendfile+0x220/0x220 [ 2170.578584] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2170.579194] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2170.579778] do_syscall_64+0x33/0x40 [ 2170.580219] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2170.580810] RIP: 0033:0x7fc37ea3eb19 [ 2170.581240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2170.583415] RSP: 002b:00007fc37bfb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2170.584318] RAX: ffffffffffffffda RBX: 00007fc37eb51f60 RCX: 00007fc37ea3eb19 [ 2170.585166] RDX: 0000000020000040 RSI: 0000000000000005 RDI: 0000000000000006 [ 2170.585966] RBP: 00007fc37bfb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2170.586823] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2170.587807] R13: 00007fff01b7d24f R14: 00007fc37bfb4300 R15: 0000000000022000 [ 2170.594834] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2170.600695] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.6'. 10:49:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:49:54 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000001) (fail_nth: 7) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2170.742584] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24697 comm=syz-executor.7 [ 2170.758288] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24741 comm=syz-executor.0 [ 2170.761272] FAULT_INJECTION: forcing a failure. [ 2170.761272] name failslab, interval 1, probability 0, space 0, times 0 [ 2170.763867] CPU: 1 PID: 24680 Comm: syz-executor.4 Not tainted 5.10.244 #1 [ 2170.765298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2170.766974] Call Trace: [ 2170.767517] dump_stack+0x107/0x167 [ 2170.768254] should_fail.cold+0x5/0xa [ 2170.769050] ? create_object.isra.0+0x3a/0xa30 [ 2170.769965] should_failslab+0x5/0x20 [ 2170.770733] kmem_cache_alloc+0x5b/0x310 [ 2170.771549] create_object.isra.0+0x3a/0xa30 [ 2170.772425] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2170.773475] __kmalloc+0x16e/0x390 [ 2170.774188] alloc_pipe_info+0x1e5/0x590 [ 2170.775036] splice_direct_to_actor+0x774/0x980 [ 2170.775614] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2170.775972] ? _cond_resched+0x10/0x30 [ 2170.778684] ? inode_security+0x107/0x140 [ 2170.779524] ? pipe_to_sendpage+0x380/0x380 [ 2170.780378] ? avc_policy_seqno+0x9/0x70 [ 2170.781216] ? selinux_file_permission+0x92/0x520 [ 2170.782172] ? do_splice_to+0x160/0x160 [ 2170.782965] ? security_file_permission+0xb1/0xe0 [ 2170.783930] do_splice_direct+0x1c4/0x290 [ 2170.784778] ? splice_direct_to_actor+0x980/0x980 [ 2170.785739] ? avc_policy_seqno+0x9/0x70 [ 2170.786541] ? security_file_permission+0xb1/0xe0 [ 2170.787499] do_sendfile+0x553/0x11e0 [ 2170.788265] ? do_pwritev+0x270/0x270 [ 2170.789060] __x64_sys_sendfile64+0x149/0x210 [ 2170.789956] ? __ia32_sys_sendfile+0x220/0x220 [ 2170.790868] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2170.791903] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2170.792954] do_syscall_64+0x33/0x40 [ 2170.793695] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2170.794719] RIP: 0033:0x7fc37ea3eb19 [ 2170.795457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2170.799117] RSP: 002b:00007fc37bfb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2170.800647] RAX: ffffffffffffffda RBX: 00007fc37eb51f60 RCX: 00007fc37ea3eb19 [ 2170.802063] RDX: 0000000020000040 RSI: 0000000000000005 RDI: 0000000000000006 [ 2170.803455] RBP: 00007fc37bfb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2170.804865] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2170.806263] R13: 00007fff01b7d24f R14: 00007fc37bfb4300 R15: 0000000000022000 10:49:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:49:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x118, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x103, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4d"]}]}, 0x118}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:49:54 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000002) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:49:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x10, 0x3) 10:49:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x100fdf2, 0x3) [ 2170.942995] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.6'. 10:49:54 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:49:54 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2170.977724] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:49:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) [ 2171.038728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24887 comm=syz-executor.0 10:49:54 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000001) (fail_nth: 8) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2171.154778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25033 comm=syz-executor.7 [ 2171.156618] FAULT_INJECTION: forcing a failure. [ 2171.156618] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2171.160099] CPU: 1 PID: 25011 Comm: syz-executor.4 Not tainted 5.10.244 #1 [ 2171.161274] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2171.162631] Call Trace: [ 2171.163066] dump_stack+0x107/0x167 [ 2171.163673] should_fail.cold+0x5/0xa [ 2171.164335] __alloc_pages_nodemask+0x182/0x600 [ 2171.165332] ? __lock_acquire+0xbb1/0x5b00 [ 2171.166018] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 2171.166998] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2171.167851] alloc_pages_current+0x187/0x280 [ 2171.168561] push_pipe+0x2b5/0x6d0 [ 2171.169172] _copy_to_iter+0x509/0x12d0 [ 2171.169827] ? __virt_addr_valid+0x346/0x5d0 [ 2171.170529] ? lock_downgrade+0x6d0/0x6d0 [ 2171.171205] ? stack_trace_save+0x8c/0xc0 [ 2171.171884] ? stack_trace_consume_entry+0x160/0x160 [ 2171.172733] ? _copy_from_iter_nocache+0xd60/0xd60 [ 2171.173534] ? __check_object_size+0x319/0x440 [ 2171.174281] seq_read_iter+0x71a/0x12b0 [ 2171.174941] proc_reg_read_iter+0x117/0x2e0 [ 2171.175633] generic_file_splice_read+0x455/0x6d0 [ 2171.176427] ? pipe_to_user+0x170/0x170 [ 2171.177095] ? fsnotify_perm.part.0+0x22d/0x620 [ 2171.177851] ? security_file_permission+0xb1/0xe0 [ 2171.178636] ? pipe_to_user+0x170/0x170 [ 2171.179271] do_splice_to+0x10e/0x160 [ 2171.179882] splice_direct_to_actor+0x2fe/0x980 [ 2171.180640] ? pipe_to_sendpage+0x380/0x380 [ 2171.181350] ? do_splice_to+0x160/0x160 [ 2171.181889] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2171.181996] ? security_file_permission+0xb1/0xe0 [ 2171.184819] do_splice_direct+0x1c4/0x290 [ 2171.185496] ? splice_direct_to_actor+0x980/0x980 [ 2171.186282] ? avc_policy_seqno+0x9/0x70 [ 2171.186935] ? security_file_permission+0xb1/0xe0 [ 2171.187716] do_sendfile+0x553/0x11e0 [ 2171.188332] ? do_pwritev+0x270/0x270 [ 2171.188976] __x64_sys_sendfile64+0x149/0x210 [ 2171.189685] ? __ia32_sys_sendfile+0x220/0x220 [ 2171.190409] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2171.191254] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2171.192082] do_syscall_64+0x33/0x40 [ 2171.192712] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2171.193536] RIP: 0033:0x7fc37ea3eb19 [ 2171.194137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2171.197039] RSP: 002b:00007fc37bfb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2171.198242] RAX: ffffffffffffffda RBX: 00007fc37eb51f60 RCX: 00007fc37ea3eb19 [ 2171.199362] RDX: 0000000020000040 RSI: 0000000000000005 RDI: 0000000000000006 [ 2171.200492] RBP: 00007fc37bfb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2171.201638] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2171.202783] R13: 00007fff01b7d24f R14: 00007fc37bfb4300 R15: 0000000000022000 10:49:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x3000000, 0x3) [ 2171.304170] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25154 comm=syz-executor.0 10:50:09 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:50:09 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000003) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:09 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:50:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x118, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x103, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4d"]}]}, 0x118}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:50:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:50:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x12, 0x3) 10:50:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xb000000, 0x3) 10:50:09 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000001) (fail_nth: 9) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2186.324068] FAULT_INJECTION: forcing a failure. [ 2186.324068] name failslab, interval 1, probability 0, space 0, times 0 [ 2186.325701] CPU: 0 PID: 25183 Comm: syz-executor.4 Not tainted 5.10.244 #1 [ 2186.326638] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2186.327634] Call Trace: [ 2186.327993] dump_stack+0x107/0x167 [ 2186.328458] should_fail.cold+0x5/0xa [ 2186.328924] ? kvmalloc_node+0x119/0x170 [ 2186.329415] should_failslab+0x5/0x20 [ 2186.329856] __kmalloc_node+0x76/0x420 [ 2186.330355] ? ns_capable_noaudit+0xe5/0x110 [ 2186.330902] kvmalloc_node+0x119/0x170 [ 2186.331362] proc_sys_call_handler+0x20c/0x5a0 [ 2186.331913] ? proc_sys_lookup+0x590/0x590 [ 2186.332410] ? direct_splice_actor+0x10f/0x170 [ 2186.332959] ? do_splice_direct+0x1c4/0x290 [ 2186.333474] ? do_sendfile+0x553/0x11e0 [ 2186.333943] ? __x64_sys_sendfile64+0x149/0x210 [ 2186.334485] ? do_syscall_64+0x33/0x40 [ 2186.334934] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2186.335552] do_iter_readv_writev+0x476/0x750 [ 2186.336084] ? new_sync_write+0x660/0x660 [ 2186.336579] ? avc_policy_seqno+0x9/0x70 [ 2186.337118] ? selinux_file_permission+0x92/0x520 [ 2186.337753] ? security_file_permission+0xb1/0xe0 [ 2186.338368] do_iter_write+0x191/0x700 [ 2186.338878] ? trace_hardirqs_on+0x5b/0x180 [ 2186.339385] vfs_iter_write+0x70/0xa0 [ 2186.339835] iter_file_splice_write+0x726/0xc90 [ 2186.340392] ? generic_splice_sendpage+0x140/0x140 [ 2186.340987] ? security_file_permission+0xb1/0xe0 [ 2186.341622] ? generic_splice_sendpage+0x140/0x140 [ 2186.342192] direct_splice_actor+0x10f/0x170 [ 2186.342766] splice_direct_to_actor+0x387/0x980 [ 2186.343363] ? pipe_to_sendpage+0x380/0x380 [ 2186.343867] ? do_splice_to+0x160/0x160 [ 2186.344327] ? security_file_permission+0xb1/0xe0 [ 2186.344898] do_splice_direct+0x1c4/0x290 [ 2186.345376] ? splice_direct_to_actor+0x980/0x980 [ 2186.345932] ? avc_policy_seqno+0x9/0x70 [ 2186.346402] ? security_file_permission+0xb1/0xe0 [ 2186.346966] do_sendfile+0x553/0x11e0 [ 2186.347413] ? do_pwritev+0x270/0x270 [ 2186.347862] __x64_sys_sendfile64+0x149/0x210 [ 2186.348376] ? __ia32_sys_sendfile+0x220/0x220 [ 2186.348912] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2186.349514] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2186.350110] do_syscall_64+0x33/0x40 [ 2186.350540] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2186.351130] RIP: 0033:0x7fc37ea3eb19 [ 2186.351562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2186.353729] RSP: 002b:00007fc37bfb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2186.354630] RAX: ffffffffffffffda RBX: 00007fc37eb51f60 RCX: 00007fc37ea3eb19 [ 2186.355472] RDX: 0000000020000040 RSI: 0000000000000005 RDI: 0000000000000006 [ 2186.356312] RBP: 00007fc37bfb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2186.357161] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2186.358002] R13: 00007fff01b7d24f R14: 00007fc37bfb4300 R15: 0000000000022000 [ 2186.359631] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2186.366653] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2186.376051] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25194 comm=syz-executor.0 10:50:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) [ 2186.418442] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25285 comm=syz-executor.7 [ 2186.422893] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:50:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x11c, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x107, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b"]}]}, 0x11c}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:50:09 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000004) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x300, 0x3) 10:50:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xf2fd0001, 0x3) 10:50:09 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000001) (fail_nth: 10) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2186.556492] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.6'. 10:50:09 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:50:09 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000005) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2186.616111] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2186.650360] FAULT_INJECTION: forcing a failure. [ 2186.650360] name failslab, interval 1, probability 0, space 0, times 0 [ 2186.653321] CPU: 1 PID: 25608 Comm: syz-executor.4 Not tainted 5.10.244 #1 [ 2186.654787] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2186.656530] Call Trace: [ 2186.657100] dump_stack+0x107/0x167 [ 2186.657871] should_fail.cold+0x5/0xa [ 2186.658790] ? create_object.isra.0+0x3a/0xa30 [ 2186.659756] should_failslab+0x5/0x20 [ 2186.660569] kmem_cache_alloc+0x5b/0x310 [ 2186.661438] create_object.isra.0+0x3a/0xa30 [ 2186.662362] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2186.663431] __kmalloc_node+0x1ae/0x420 [ 2186.664274] ? ns_capable_noaudit+0xe5/0x110 [ 2186.665209] kvmalloc_node+0x119/0x170 [ 2186.666035] proc_sys_call_handler+0x20c/0x5a0 [ 2186.666999] ? proc_sys_lookup+0x590/0x590 [ 2186.667884] ? direct_splice_actor+0x10f/0x170 [ 2186.668856] ? do_splice_direct+0x1c4/0x290 [ 2186.669765] ? do_sendfile+0x553/0x11e0 [ 2186.670596] ? __x64_sys_sendfile64+0x149/0x210 [ 2186.671572] ? do_syscall_64+0x33/0x40 [ 2186.672402] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2186.673530] do_iter_readv_writev+0x476/0x750 [ 2186.674478] ? new_sync_write+0x660/0x660 [ 2186.675329] ? avc_policy_seqno+0x9/0x70 [ 2186.676185] ? selinux_file_permission+0x92/0x520 [ 2186.677200] ? security_file_permission+0xb1/0xe0 [ 2186.678218] do_iter_write+0x191/0x700 [ 2186.679033] ? trace_hardirqs_on+0x5b/0x180 [ 2186.679935] vfs_iter_write+0x70/0xa0 [ 2186.680745] iter_file_splice_write+0x726/0xc90 [ 2186.681723] ? generic_splice_sendpage+0x140/0x140 [ 2186.682779] ? security_file_permission+0xb1/0xe0 [ 2186.683801] ? generic_splice_sendpage+0x140/0x140 [ 2186.684838] direct_splice_actor+0x10f/0x170 [ 2186.685786] splice_direct_to_actor+0x387/0x980 [ 2186.686753] ? pipe_to_sendpage+0x380/0x380 [ 2186.687681] ? do_splice_to+0x160/0x160 [ 2186.688508] ? security_file_permission+0xb1/0xe0 [ 2186.689522] do_splice_direct+0x1c4/0x290 [ 2186.690402] ? splice_direct_to_actor+0x980/0x980 [ 2186.691420] ? avc_policy_seqno+0x9/0x70 [ 2186.692270] ? security_file_permission+0xb1/0xe0 [ 2186.693290] do_sendfile+0x553/0x11e0 [ 2186.694113] ? do_pwritev+0x270/0x270 [ 2186.694909] __x64_sys_sendfile64+0x149/0x210 [ 2186.695852] ? __ia32_sys_sendfile+0x220/0x220 [ 2186.696823] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2186.697949] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2186.699194] do_syscall_64+0x33/0x40 [ 2186.700071] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2186.701293] RIP: 0033:0x7fc37ea3eb19 [ 2186.702100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2186.706281] RSP: 002b:00007fc37bfb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2186.708115] RAX: ffffffffffffffda RBX: 00007fc37eb51f60 RCX: 00007fc37ea3eb19 [ 2186.709831] RDX: 0000000020000040 RSI: 0000000000000005 RDI: 0000000000000006 [ 2186.711426] RBP: 00007fc37bfb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2186.713121] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 2186.714754] R13: 00007fff01b7d24f R14: 00007fc37bfb4300 R15: 0000000000022000 [ 2186.736481] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25762 comm=syz-executor.0 [ 2186.798675] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25813 comm=syz-executor.7 [ 2186.804655] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2202.062147] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25830 comm=syz-executor.0 10:50:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x600, 0x3) 10:50:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:50:25 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:50:25 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000006) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:25 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:50:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x11c, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x107, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b"]}]}, 0x11c}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:50:25 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000001) (fail_nth: 11) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) [ 2202.090077] FAULT_INJECTION: forcing a failure. [ 2202.090077] name failslab, interval 1, probability 0, space 0, times 0 [ 2202.093216] CPU: 0 PID: 25825 Comm: syz-executor.4 Not tainted 5.10.244 #1 [ 2202.095115] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2202.097214] Call Trace: [ 2202.097803] dump_stack+0x107/0x167 [ 2202.098641] should_fail.cold+0x5/0xa [ 2202.099436] ? kvmalloc_node+0x119/0x170 [ 2202.100297] should_failslab+0x5/0x20 [ 2202.101101] __kmalloc_node+0x76/0x420 [ 2202.101924] ? ns_capable_noaudit+0xe5/0x110 [ 2202.102848] kvmalloc_node+0x119/0x170 [ 2202.103667] proc_sys_call_handler+0x20c/0x5a0 [ 2202.104631] ? proc_sys_lookup+0x590/0x590 [ 2202.105528] ? direct_splice_actor+0x10f/0x170 [ 2202.106490] ? do_splice_direct+0x1c4/0x290 [ 2202.107406] ? do_sendfile+0x553/0x11e0 [ 2202.108238] ? __x64_sys_sendfile64+0x149/0x210 [ 2202.109218] ? do_syscall_64+0x33/0x40 [ 2202.110031] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2202.111151] do_iter_readv_writev+0x476/0x750 [ 2202.112101] ? new_sync_write+0x660/0x660 [ 2202.112990] ? avc_policy_seqno+0x9/0x70 [ 2202.113846] ? selinux_file_permission+0x92/0x520 [ 2202.114866] ? security_file_permission+0xb1/0xe0 sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xfeffffff, 0x3) [ 2202.115883] do_iter_write+0x191/0x700 [ 2202.116828] ? trace_hardirqs_on+0x5b/0x180 [ 2202.117786] vfs_iter_write+0x70/0xa0 [ 2202.118625] iter_file_splice_write+0x726/0xc90 [ 2202.119658] ? generic_splice_sendpage+0x140/0x140 [ 2202.120744] ? security_file_permission+0xb1/0xe0 [ 2202.121808] ? generic_splice_sendpage+0x140/0x140 [ 2202.122880] direct_splice_actor+0x10f/0x170 [ 2202.123844] splice_direct_to_actor+0x387/0x980 [ 2202.124869] ? pipe_to_sendpage+0x380/0x380 [ 2202.125814] ? do_splice_to+0x160/0x160 [ 2202.126687] ? security_file_permission+0xb1/0xe0 [ 2202.127742] do_splice_direct+0x1c4/0x290 [ 2202.128648] ? splice_direct_to_actor+0x980/0x980 [ 2202.129708] ? avc_policy_seqno+0x9/0x70 [ 2202.130618] ? security_file_permission+0xb1/0xe0 [ 2202.131681] do_sendfile+0x553/0x11e0 [ 2202.132524] ? do_pwritev+0x270/0x270 [ 2202.133377] __x64_sys_sendfile64+0x149/0x210 [ 2202.134350] ? __ia32_sys_sendfile+0x220/0x220 [ 2202.135354] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2202.136494] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2202.137627] do_syscall_64+0x33/0x40 [ 2202.138434] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2202.139545] RIP: 0033:0x7fc37ea3eb19 [ 2202.140355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2202.144393] RSP: 002b:00007fc37bfb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2202.146057] RAX: ffffffffffffffda RBX: 00007fc37eb51f60 RCX: 00007fc37ea3eb19 [ 2202.147614] RDX: 0000000020000040 RSI: 0000000000000005 RDI: 0000000000000006 [ 2202.149179] RBP: 00007fc37bfb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2202.150738] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 2202.152292] R13: 00007fff01b7d24f R14: 00007fc37bfb4300 R15: 0000000000022000 [ 2202.163827] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2202.167073] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:50:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xfffffffe, 0x3) 10:50:25 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000007) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:25 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:50:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) [ 2202.240073] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26116 comm=syz-executor.7 [ 2202.247430] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2202.255027] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26153 comm=syz-executor.0 10:50:25 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x11c, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x107, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b"]}]}, 0x11c}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:50:25 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000009) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:50:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xb00, 0x3) [ 2202.433207] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2202.476234] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2202.538928] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26564 comm=syz-executor.7 [ 2202.544749] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:50:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xc00, 0x3) 10:50:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x4010040c000, 0x3) 10:50:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x109, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:50:42 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0x9, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:42 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:50:42 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:50:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:50:42 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x8000000a) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2218.964007] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2218.978050] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2219.000326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26594 comm=syz-executor.0 10:50:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:50:42 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0x10, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x100000000000, 0x3) 10:50:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) [ 2219.147397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26810 comm=syz-executor.7 10:50:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x109, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2219.170963] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2219.218587] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2219.265531] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26905 comm=syz-executor.0 10:50:56 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000010) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x109, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:50:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x4000000000000, 0x3) 10:50:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x1200, 0x3) [ 2233.295684] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:50:56 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0x63, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:50:56 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x0, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:50:56 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) [ 2233.299827] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2233.315335] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26925 comm=syz-executor.0 10:50:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:50:56 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0x1b8, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x10000000000000, 0x3) [ 2233.438904] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27054 comm=syz-executor.7 [ 2233.459064] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:50:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0xb) 10:50:56 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000033) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:50:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x114, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0xfe, 0x0, 0x0, 0x1, [@generic="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"]}]}, 0x114}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:50:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x3f00, 0x3) [ 2233.563874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27143 comm=syz-executor.0 10:50:56 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0x446, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2233.623153] netlink: 240 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2233.629688] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2233.792536] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27351 comm=syz-executor.7 [ 2233.803314] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:51:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x40000, 0x3) 10:51:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x114, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0xfe, 0x0, 0x0, 0x1, [@generic="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"]}]}, 0x114}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:51:13 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x0, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:51:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0xb) [ 2250.522985] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:51:13 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:51:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xc0400001040000, 0x3) 10:51:13 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000063) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:51:13 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0x4a2, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2250.609793] netlink: 240 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2250.638121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27420 comm=syz-executor.0 [ 2250.667941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27457 comm=syz-executor.7 10:51:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0xb) [ 2250.698851] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:51:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x300000000000000, 0x3) 10:51:14 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800001b8) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:51:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x100000, 0x3) 10:51:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x114, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0xfe, 0x0, 0x0, 0x1, [@generic="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"]}]}, 0x114}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:51:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xb) 10:51:14 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0x870, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2250.911448] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2250.936427] netlink: 240 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2250.952244] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27798 comm=syz-executor.0 [ 2251.044367] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27895 comm=syz-executor.7 10:51:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xb00000000000000, 0x3) 10:51:14 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) [ 2251.062419] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:51:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xb) [ 2251.233742] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28028 comm=syz-executor.0 10:51:28 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:51:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xf2fd000100000000, 0x3) 10:51:28 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x0, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:51:28 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003d8) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:51:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:51:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x100fdf2, 0x3) 10:51:28 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000002) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:51:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xb) [ 2265.436815] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2265.449912] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28129 comm=syz-executor.7 [ 2265.478225] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28153 comm=syz-executor.0 [ 2265.483133] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2265.488819] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:51:28 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000003) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:51:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x3000000, 0x3) [ 2265.557440] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:51:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xfeffffff00000000, 0x3) 10:51:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16], 0xb) [ 2265.600279] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28369 comm=syz-executor.7 [ 2265.607728] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:51:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2265.693745] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28445 comm=syz-executor.0 [ 2265.697685] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:51:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:51:46 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000004) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:51:46 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:51:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16], 0xb) 10:51:46 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003de) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:51:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x6000000, 0x3) 10:51:46 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:51:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xffffffff00000000, 0x3) [ 2282.855284] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2282.864457] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2282.902353] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28487 comm=syz-executor.0 [ 2282.923088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28533 comm=syz-executor.7 [ 2282.948204] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:51:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16], 0xb) 10:51:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x2) 10:51:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:51:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xb000000, 0x3) 10:51:46 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003e5) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:51:46 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000005) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2283.172362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28879 comm=syz-executor.0 [ 2283.204021] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2283.206863] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:51:46 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2283.239121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28888 comm=syz-executor.7 [ 2283.251585] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:51:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x4) [ 2283.416287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29037 comm=syz-executor.0 10:52:04 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:52:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0xb) [ 2300.778004] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2300.784070] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:52:04 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000006) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xc000000, 0x3) 10:52:04 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:52:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:52:04 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003eb) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x3000000, 0x3) [ 2300.796751] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2300.825814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29123 comm=syz-executor.7 [ 2300.840933] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2300.843554] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29144 comm=syz-executor.0 10:52:04 executing program 2: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0x446, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x12000000, 0x3) 10:52:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x10) 10:52:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:52:04 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000007) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:04 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003ed) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2301.038359] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2301.061826] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2301.113794] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29438 comm=syz-executor.0 [ 2301.118130] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29437 comm=syz-executor.7 10:52:04 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2301.136084] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:52:04 executing program 2: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003eb) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:04 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000009) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x3f000000, 0x3) 10:52:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0xfffffffe) [ 2301.349572] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2301.380681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29589 comm=syz-executor.0 [ 2301.394451] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29599 comm=syz-executor.7 [ 2301.412079] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:52:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2317.314902] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2317.336529] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2317.348845] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29677 comm=syz-executor.7 10:52:20 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003f2) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:20 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:52:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffff6c}, 0x1c) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000209042494cb0b8f09e4f8a9bc8d42385bd016e5cceec01b5b83e481c6234c5f294b0c28dbf1c961facf20a3fba835fa5e035813699643d58effb5e62c53ecc32572826c7c59f0b61bc504859eb5d35994864f2a99f67a53c7cc6f62d23ec582d255d236d31549717b2167b85bc70d5", @ANYRES32=r3, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:52:20 executing program 2: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0x63, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:20 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x8000000a) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xf2fd0001, 0x3) 10:52:20 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) [ 2317.359883] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:52:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:52:20 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000010) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xfeffffff, 0x3) [ 2317.462258] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:52:20 executing program 2: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) [ 2317.482928] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2317.508973] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29936 comm=syz-executor.0 [ 2317.513358] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29937 comm=syz-executor.7 [ 2317.524644] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:52:39 executing program 2: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:52:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:52:39 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:52:39 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:52:39 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003f9) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xfffffffe, 0x3) 10:52:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc044}, 0x8d0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000001400)={0x808, 0x2, 0xa68, 0x4, 0x401}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="ff0f0000000000002eaf6669a7928ab1ae1d3e0f32b43272087ab89b9ad43e86a1cc6e061b25babd651e6d60027492239d712e9b601c268f2b48689267e60f70"]) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0xff}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) bind$802154_dgram(r4, &(0x7f0000000200)={0x24, @long={0x3, 0x3, {0xaaaaaaaaaaaa0002}}}, 0x14) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r2, 0xc1, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000100)=0x3, 0x4) r5 = fsmount(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x81, 0x0, 0x5, 0x80, 0x0, 0xaf, 0xc416e18936b988b4, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x2}, 0x94, 0x4, 0x56, 0x1, 0x400, 0x86db, 0xb30a, 0x0, 0x7, 0x0, 0x8a}, 0xffffffffffffffff, 0x9, r5, 0x1) 10:52:39 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000035) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2336.226485] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2336.229277] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2336.279595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30039 comm=syz-executor.7 [ 2336.293180] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:52:39 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000063) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, 0x0, 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:52:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x4010040c000, 0x3) 10:52:39 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003fd) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2336.426479] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:52:39 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800001b8) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2336.459331] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:52:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, 0x0, 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2336.476692] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30333 comm=syz-executor.7 [ 2336.485629] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:52:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) 10:52:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x100000000000, 0x3) [ 2336.551841] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2336.559162] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2336.581391] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30421 comm=syz-executor.7 [ 2336.590417] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:52:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, 0x0, 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:52:39 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2336.658069] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:52:55 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:52:55 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003d5) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:52:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x4000000000000, 0x3) 10:52:55 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000404) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 1) 10:52:55 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:52:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000053a80)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380), 0x102, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f00000006c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057b00)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x80, "5fabd34a60e47f"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000054a80)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055a80)={0x1000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {r4, r9}], 0x7f, "d6bb83ae1d9764"}) r10 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r10, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2352.010740] FAULT_INJECTION: forcing a failure. [ 2352.010740] name failslab, interval 1, probability 0, space 0, times 0 [ 2352.012984] CPU: 1 PID: 30460 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2352.012999] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2352.015461] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2352.016809] Call Trace: [ 2352.017239] dump_stack+0x107/0x167 [ 2352.017825] should_fail.cold+0x5/0xa [ 2352.018455] ? jbd2__journal_start+0x190/0x7e0 [ 2352.019175] should_failslab+0x5/0x20 [ 2352.019790] kmem_cache_alloc+0x5b/0x310 [ 2352.020261] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2352.020447] jbd2__journal_start+0x190/0x7e0 [ 2352.022997] __ext4_journal_start_sb+0x214/0x390 [ 2352.023743] ext4_dirty_inode+0xbc/0x130 [ 2352.024378] ? ext4_setattr+0x20f0/0x20f0 [ 2352.025026] __mark_inode_dirty+0x492/0xd40 [ 2352.025703] ? security_inode_need_killpriv+0x79/0xa0 [ 2352.026503] generic_update_time+0x21c/0x370 [ 2352.027173] file_update_time+0x43a/0x520 [ 2352.027811] ? evict_inodes+0x470/0x470 [ 2352.028434] ? down_write_killable+0x180/0x180 [ 2352.029151] file_modified+0x7d/0xa0 [ 2352.029765] ext4_file_write_iter+0x8f8/0x1530 [ 2352.030488] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2352.031187] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.031997] new_sync_write+0x42c/0x660 [ 2352.032603] ? new_sync_read+0x6f0/0x6f0 [ 2352.033224] ? ksys_write+0x12d/0x260 [ 2352.033814] ? lock_release+0x680/0x680 [ 2352.034482] ? avc_policy_seqno+0x9/0x70 [ 2352.035119] ? selinux_file_permission+0x92/0x520 [ 2352.035873] vfs_write+0x7c0/0xb10 [ 2352.036422] ksys_write+0x12d/0x260 [ 2352.036975] ? __ia32_sys_read+0xb0/0xb0 [ 2352.037598] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2352.038529] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2352.039402] do_syscall_64+0x33/0x40 [ 2352.039968] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2352.040754] RIP: 0033:0x7f0068470b19 [ 2352.041353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2352.044164] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2352.045326] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2352.046415] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2352.047494] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2352.048716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2352.049793] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2352.059051] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30485 comm=syz-executor.7 [ 2352.078312] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2352.084112] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30558 comm=syz-executor.0 10:52:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000140)=ANY=[@ANYBLOB="9a12b6c48db288c6e79b4fd9ca66a23ecef0cefde83e0e5ad7aa94da7f5b9fc56d86dad300"/52, @ANYRES32=r3, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:52:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x10000000000000, 0x3) 10:52:55 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003dc) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:52:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:52:55 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:52:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 2) [ 2352.264129] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:52:55 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000406) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2352.320474] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2352.326460] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30789 comm=syz-executor.7 [ 2352.343933] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2352.349091] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30792 comm=syz-executor.0 10:52:55 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) [ 2352.355217] FAULT_INJECTION: forcing a failure. [ 2352.355217] name failslab, interval 1, probability 0, space 0, times 0 [ 2352.357912] CPU: 0 PID: 30787 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2352.359369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2352.361095] Call Trace: [ 2352.361655] dump_stack+0x107/0x167 [ 2352.362433] should_fail.cold+0x5/0xa [ 2352.363227] ? create_object.isra.0+0x3a/0xa30 [ 2352.364181] should_failslab+0x5/0x20 [ 2352.364977] kmem_cache_alloc+0x5b/0x310 [ 2352.365892] create_object.isra.0+0x3a/0xa30 [ 2352.366899] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2352.367964] kmem_cache_alloc+0x159/0x310 [ 2352.368840] jbd2__journal_start+0x190/0x7e0 [ 2352.369772] __ext4_journal_start_sb+0x214/0x390 [ 2352.370789] ext4_dirty_inode+0xbc/0x130 [ 2352.371637] ? ext4_setattr+0x20f0/0x20f0 [ 2352.372501] __mark_inode_dirty+0x492/0xd40 [ 2352.373408] ? security_inode_need_killpriv+0x79/0xa0 [ 2352.374510] generic_update_time+0x21c/0x370 [ 2352.375431] file_update_time+0x43a/0x520 [ 2352.376303] ? evict_inodes+0x470/0x470 [ 2352.377141] ? down_write_killable+0x180/0x180 [ 2352.378115] file_modified+0x7d/0xa0 [ 2352.378895] ext4_file_write_iter+0x8f8/0x1530 [ 2352.379868] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2352.380830] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.381936] new_sync_write+0x42c/0x660 [ 2352.382792] ? new_sync_read+0x6f0/0x6f0 [ 2352.383643] ? ksys_write+0x12d/0x260 [ 2352.384449] ? lock_release+0x680/0x680 [ 2352.385281] ? avc_policy_seqno+0x9/0x70 [ 2352.386145] ? selinux_file_permission+0x92/0x520 [ 2352.387176] vfs_write+0x7c0/0xb10 [ 2352.387931] ksys_write+0x12d/0x260 [ 2352.388698] ? __ia32_sys_read+0xb0/0xb0 [ 2352.389555] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2352.390667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2352.391772] do_syscall_64+0x33/0x40 [ 2352.392556] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2352.393630] RIP: 0033:0x7f0068470b19 [ 2352.394413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2352.398290] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2352.399897] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2352.401393] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2352.402895] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2352.404393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2352.405893] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:52:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 3) [ 2352.581603] FAULT_INJECTION: forcing a failure. [ 2352.581603] name failslab, interval 1, probability 0, space 0, times 0 [ 2352.582967] CPU: 1 PID: 31063 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2352.583774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2352.584691] Call Trace: [ 2352.585011] dump_stack+0x107/0x167 [ 2352.585438] should_fail.cold+0x5/0xa [ 2352.585884] ? jbd2__journal_start+0x190/0x7e0 [ 2352.586429] should_failslab+0x5/0x20 [ 2352.586875] kmem_cache_alloc+0x5b/0x310 [ 2352.587354] jbd2__journal_start+0x190/0x7e0 [ 2352.587876] __ext4_journal_start_sb+0x214/0x390 [ 2352.588432] ext4_file_write_iter+0xee9/0x1530 [ 2352.588944] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2352.589487] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.590103] new_sync_write+0x42c/0x660 [ 2352.590578] ? new_sync_read+0x6f0/0x6f0 [ 2352.591054] ? ksys_write+0x12d/0x260 [ 2352.591505] ? lock_release+0x680/0x680 [ 2352.591970] ? avc_policy_seqno+0x9/0x70 [ 2352.592442] ? selinux_file_permission+0x92/0x520 [ 2352.593008] vfs_write+0x7c0/0xb10 [ 2352.593426] ksys_write+0x12d/0x260 [ 2352.593845] ? __ia32_sys_read+0xb0/0xb0 [ 2352.594297] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2352.594903] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2352.595503] do_syscall_64+0x33/0x40 [ 2352.595938] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2352.596529] RIP: 0033:0x7f0068470b19 [ 2352.596937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2352.599064] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2352.599901] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2352.600725] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2352.601505] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2352.602324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2352.603144] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:53:10 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003e3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:53:10 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:53:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xc0400001040000, 0x3) 10:53:10 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x8000040e) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2366.663817] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:53:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:53:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"/397], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0xff}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) openat(r4, &(0x7f0000000100)='./file0\x00', 0x420000, 0x2) r5 = openat$cgroup_type(r0, &(0x7f0000000140), 0x2, 0x0) sendfile(r5, r0, &(0x7f0000000180)=0xe46, 0x1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:53:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 4) 10:53:10 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2366.679248] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2366.690762] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31118 comm=syz-executor.7 [ 2366.695511] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2366.700029] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=285 sclass=netlink_route_socket pid=31122 comm=syz-executor.0 [ 2366.721749] FAULT_INJECTION: forcing a failure. [ 2366.721749] name failslab, interval 1, probability 0, space 0, times 0 [ 2366.724527] CPU: 1 PID: 31123 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2366.725991] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2366.727752] Call Trace: [ 2366.728314] dump_stack+0x107/0x167 [ 2366.729091] should_fail.cold+0x5/0xa [ 2366.729902] ? create_object.isra.0+0x3a/0xa30 [ 2366.730894] should_failslab+0x5/0x20 [ 2366.731715] kmem_cache_alloc+0x5b/0x310 [ 2366.732571] ? ext4_dirty_inode+0x107/0x130 [ 2366.733491] create_object.isra.0+0x3a/0xa30 10:53:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x300000000000000, 0x3) [ 2366.734426] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2366.735727] kmem_cache_alloc+0x159/0x310 [ 2366.736610] jbd2__journal_start+0x190/0x7e0 [ 2366.737560] __ext4_journal_start_sb+0x214/0x390 [ 2366.738577] ext4_file_write_iter+0xee9/0x1530 [ 2366.739572] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2366.740548] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2366.741693] new_sync_write+0x42c/0x660 [ 2366.742547] ? new_sync_read+0x6f0/0x6f0 [ 2366.743422] ? ksys_write+0x12d/0x260 [ 2366.744230] ? lock_release+0x680/0x680 [ 2366.745082] ? avc_policy_seqno+0x9/0x70 10:53:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2366.746033] ? selinux_file_permission+0x92/0x520 [ 2366.747136] vfs_write+0x7c0/0xb10 [ 2366.747900] ksys_write+0x12d/0x260 [ 2366.748680] ? __ia32_sys_read+0xb0/0xb0 [ 2366.749555] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2366.750687] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2366.751809] do_syscall_64+0x33/0x40 [ 2366.752605] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2366.753700] RIP: 0033:0x7f0068470b19 [ 2366.754510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2366.758482] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2366.760104] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2366.761626] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2366.763182] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2366.764717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2366.766254] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2366.787806] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2366.793333] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31167 comm=syz-executor.0 [ 2366.796424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=285 sclass=netlink_route_socket pid=31122 comm=syz-executor.0 [ 2366.806926] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31261 comm=syz-executor.7 [ 2366.813067] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2366.843060] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:53:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x600000000000000, 0x3) 10:53:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x895) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:53:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 5) [ 2366.934687] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:53:10 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003e9) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2366.979030] FAULT_INJECTION: forcing a failure. [ 2366.979030] name failslab, interval 1, probability 0, space 0, times 0 [ 2366.980693] CPU: 0 PID: 31530 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2366.981572] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2366.982636] Call Trace: [ 2366.982971] dump_stack+0x107/0x167 [ 2366.983430] should_fail.cold+0x5/0xa [ 2366.983909] ? __iomap_dio_rw+0x1ee/0x1110 [ 2366.984498] should_failslab+0x5/0x20 [ 2366.985110] kmem_cache_alloc_trace+0x55/0x320 [ 2366.985694] __iomap_dio_rw+0x1ee/0x1110 [ 2366.986228] ? jbd2_journal_stop+0x188/0xdc0 [ 2366.986795] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2366.987379] ? ext4_orphan_add+0x253/0x9e0 [ 2366.987915] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2366.988535] ? ext4_empty_dir+0xae0/0xae0 [ 2366.989059] ? jbd2__journal_start+0xf3/0x7e0 [ 2366.989625] iomap_dio_rw+0x31/0x90 [ 2366.990106] ext4_file_write_iter+0xe0e/0x1530 [ 2366.990684] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2366.991261] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2366.991954] new_sync_write+0x42c/0x660 [ 2366.992465] ? new_sync_read+0x6f0/0x6f0 [ 2366.992983] ? ksys_write+0x12d/0x260 [ 2366.993476] ? lock_release+0x680/0x680 [ 2366.993982] ? avc_policy_seqno+0x9/0x70 [ 2366.994519] ? selinux_file_permission+0x92/0x520 [ 2366.995151] vfs_write+0x7c0/0xb10 [ 2366.995599] ksys_write+0x12d/0x260 [ 2366.996060] ? __ia32_sys_read+0xb0/0xb0 [ 2366.996577] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2366.997241] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2366.997892] do_syscall_64+0x33/0x40 [ 2366.998365] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2366.999013] RIP: 0033:0x7f0068470b19 [ 2366.999480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2367.001775] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2367.002737] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2367.003644] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2367.004533] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2367.005421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2367.006316] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:53:10 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000417) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2367.010966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31541 comm=syz-executor.7 [ 2367.038849] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:53:10 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:53:27 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000500) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:53:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:53:27 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:53:27 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003eb) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:53:27 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:53:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 6) 10:53:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0x3, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0xff}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:53:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xb00000000000000, 0x3) [ 2384.417082] FAULT_INJECTION: forcing a failure. [ 2384.417082] name failslab, interval 1, probability 0, space 0, times 0 [ 2384.418603] CPU: 1 PID: 31765 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2384.419399] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2384.420359] Call Trace: [ 2384.420669] dump_stack+0x107/0x167 [ 2384.421089] should_fail.cold+0x5/0xa [ 2384.421529] ? create_object.isra.0+0x3a/0xa30 [ 2384.422051] should_failslab+0x5/0x20 [ 2384.422507] kmem_cache_alloc+0x5b/0x310 [ 2384.422985] create_object.isra.0+0x3a/0xa30 [ 2384.423485] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2384.424071] kmem_cache_alloc_trace+0x151/0x320 [ 2384.424611] __iomap_dio_rw+0x1ee/0x1110 [ 2384.425086] ? jbd2_journal_stop+0x188/0xdc0 [ 2384.425592] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2384.426118] ? ext4_orphan_add+0x253/0x9e0 [ 2384.426627] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2384.427195] ? ext4_empty_dir+0xae0/0xae0 [ 2384.427669] ? jbd2__journal_start+0xf3/0x7e0 [ 2384.428184] iomap_dio_rw+0x31/0x90 [ 2384.428603] ext4_file_write_iter+0xe0e/0x1530 [ 2384.429143] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2384.429668] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2384.429881] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2384.430287] new_sync_write+0x42c/0x660 [ 2384.430305] ? new_sync_read+0x6f0/0x6f0 [ 2384.433406] ? ksys_write+0x12d/0x260 [ 2384.433845] ? lock_release+0x680/0x680 [ 2384.434326] ? avc_policy_seqno+0x9/0x70 [ 2384.434796] ? selinux_file_permission+0x92/0x520 [ 2384.435365] vfs_write+0x7c0/0xb10 [ 2384.435776] ksys_write+0x12d/0x260 [ 2384.436202] ? __ia32_sys_read+0xb0/0xb0 [ 2384.436670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2384.437273] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2384.437865] do_syscall_64+0x33/0x40 [ 2384.438319] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2384.438913] RIP: 0033:0x7f0068470b19 [ 2384.439337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2384.441445] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2384.442346] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2384.443164] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2384.443988] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2384.444805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2384.445626] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2384.476914] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:53:27 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000600) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:53:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0xff}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18, 0x0, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) lseek(r0, 0x0, 0x3) [ 2384.539148] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31910 comm=syz-executor.7 [ 2384.541204] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:53:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 7) 10:53:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xc00000000000000, 0x3) 10:53:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2384.643828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32169 comm=syz-executor.0 [ 2384.661468] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:53:28 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) [ 2384.688763] FAULT_INJECTION: forcing a failure. [ 2384.688763] name failslab, interval 1, probability 0, space 0, times 0 [ 2384.689129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32249 comm=syz-executor.7 [ 2384.691644] CPU: 0 PID: 32195 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2384.694419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2384.696326] Call Trace: [ 2384.696935] dump_stack+0x107/0x167 [ 2384.697775] should_fail.cold+0x5/0xa [ 2384.698659] ? jbd2__journal_start+0x190/0x7e0 [ 2384.699705] should_failslab+0x5/0x20 [ 2384.700579] kmem_cache_alloc+0x5b/0x310 [ 2384.701509] ? __kernel_text_address+0x9/0x40 [ 2384.702550] jbd2__journal_start+0x190/0x7e0 [ 2384.703566] __ext4_journal_start_sb+0x214/0x390 [ 2384.704659] ext4_iomap_begin+0x485/0x700 [ 2384.705624] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2384.706751] ? kasan_save_stack+0x1b/0x40 [ 2384.707703] ? ext4_file_write_iter+0xe0e/0x1530 [ 2384.708792] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2384.710253] ? lock_chain_count+0x20/0x20 [ 2384.711218] iomap_apply+0x164/0x810 [ 2384.712074] ? iomap_dio_rw+0x90/0x90 [ 2384.712951] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2384.714287] ? mark_held_locks+0x9e/0xe0 [ 2384.715232] ? filemap_check_errors+0xa5/0x150 [ 2384.716282] __iomap_dio_rw+0x6cd/0x1110 [ 2384.717209] ? iomap_dio_rw+0x90/0x90 [ 2384.718101] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2384.719159] ? ext4_orphan_add+0x253/0x9e0 [ 2384.720127] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2384.721255] ? ext4_empty_dir+0xae0/0xae0 [ 2384.722200] ? jbd2__journal_start+0xf3/0x7e0 [ 2384.723248] iomap_dio_rw+0x31/0x90 [ 2384.724085] ext4_file_write_iter+0xe0e/0x1530 [ 2384.725146] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2384.726197] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2384.727416] new_sync_write+0x42c/0x660 [ 2384.728329] ? new_sync_read+0x6f0/0x6f0 [ 2384.729261] ? ksys_write+0x12d/0x260 [ 2384.730137] ? lock_release+0x680/0x680 [ 2384.731061] ? avc_policy_seqno+0x9/0x70 [ 2384.731988] ? selinux_file_permission+0x92/0x520 [ 2384.733110] vfs_write+0x7c0/0xb10 [ 2384.733933] ksys_write+0x12d/0x260 [ 2384.734779] ? __ia32_sys_read+0xb0/0xb0 [ 2384.735718] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2384.736921] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2384.738107] do_syscall_64+0x33/0x40 [ 2384.738970] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2384.740144] RIP: 0033:0x7f0068470b19 [ 2384.740994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2384.745222] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2384.746973] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2384.748604] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2384.750244] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2384.751879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2384.753513] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2384.764344] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:53:28 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003f0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2384.777169] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:53:28 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007b9) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:53:44 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:53:44 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003f7) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:53:44 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:53:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:53:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x1200000000000000, 0x3) 10:53:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 8) 10:53:44 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007be) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2401.169913] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2401.172484] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2401.190187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32523 comm=syz-executor.7 [ 2401.197668] FAULT_INJECTION: forcing a failure. [ 2401.197668] name failslab, interval 1, probability 0, space 0, times 0 [ 2401.199192] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2401.200607] CPU: 0 PID: 32521 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2401.202746] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.204476] Call Trace: [ 2401.205021] dump_stack+0x107/0x167 [ 2401.205776] should_fail.cold+0x5/0xa [ 2401.206587] ? create_object.isra.0+0x3a/0xa30 [ 2401.207551] should_failslab+0x5/0x20 [ 2401.208342] kmem_cache_alloc+0x5b/0x310 [ 2401.209199] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2401.210325] create_object.isra.0+0x3a/0xa30 [ 2401.211267] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 10:53:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x3c) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x1c, r5, 0x200, 0x70bd2d, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000010) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r5, 0x100, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x6}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4000) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r5, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r6, 0x660c) r7 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r7, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2401.212330] kmem_cache_alloc+0x159/0x310 [ 2401.213339] ? __kernel_text_address+0x9/0x40 [ 2401.214296] jbd2__journal_start+0x190/0x7e0 [ 2401.215243] __ext4_journal_start_sb+0x214/0x390 [ 2401.216256] ext4_iomap_begin+0x485/0x700 [ 2401.217148] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2401.218185] ? kasan_save_stack+0x1b/0x40 [ 2401.219069] ? ext4_file_write_iter+0xe0e/0x1530 [ 2401.220075] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2401.221414] ? lock_chain_count+0x20/0x20 [ 2401.222304] iomap_apply+0x164/0x810 [ 2401.223116] ? iomap_dio_rw+0x90/0x90 [ 2401.223927] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2401.225161] ? mark_held_locks+0x9e/0xe0 [ 2401.226035] ? filemap_check_errors+0xa5/0x150 [ 2401.227020] __iomap_dio_rw+0x6cd/0x1110 [ 2401.227880] ? iomap_dio_rw+0x90/0x90 [ 2401.228704] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2401.229676] ? ext4_orphan_add+0x253/0x9e0 [ 2401.230577] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2401.231617] ? ext4_empty_dir+0xae0/0xae0 [ 2401.232493] ? jbd2__journal_start+0xf3/0x7e0 [ 2401.233452] iomap_dio_rw+0x31/0x90 [ 2401.234230] ext4_file_write_iter+0xe0e/0x1530 [ 2401.235221] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2401.236195] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.237313] new_sync_write+0x42c/0x660 [ 2401.238160] ? new_sync_read+0x6f0/0x6f0 [ 2401.239037] ? ksys_write+0x12d/0x260 [ 2401.239850] ? lock_release+0x680/0x680 [ 2401.240695] ? avc_policy_seqno+0x9/0x70 [ 2401.241554] ? selinux_file_permission+0x92/0x520 [ 2401.242611] vfs_write+0x7c0/0xb10 [ 2401.243373] ksys_write+0x12d/0x260 [ 2401.244147] ? __ia32_sys_read+0xb0/0xb0 [ 2401.245010] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.246123] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.247236] do_syscall_64+0x33/0x40 [ 2401.248024] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2401.249111] RIP: 0033:0x7f0068470b19 [ 2401.249900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.253809] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2401.255438] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2401.256946] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2401.258453] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.259959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2401.261463] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2401.353022] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32854 comm=syz-executor.0 10:53:44 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:53:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x3f00000000000000, 0x3) 10:53:44 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007c0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2401.406520] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2401.451644] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32940 comm=syz-executor.7 [ 2401.455054] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32945 comm=syz-executor.0 [ 2401.474958] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:53:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:53:44 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2401.517117] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:53:44 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800003fb) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:53:44 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:53:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:53:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 9) 10:53:44 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007c4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:53:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x2, 0x80000001}}, './file0\x00'}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) recvmmsg$unix(r0, &(0x7f0000008900)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000400)=""/197, 0xc5}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000600)=""/165, 0xa5}, {&(0x7f0000000240)}, {&(0x7f0000000500)=""/126, 0x7e}, {&(0x7f00000006c0)=""/170, 0xaa}, {&(0x7f00000002c0)=""/20, 0x14}], 0x7, &(0x7f0000000800)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f0000000880), 0x6e, &(0x7f0000000940)=[{&(0x7f0000000900)=""/11, 0xb}], 0x1, &(0x7f0000000980)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f00000009c0)=@abs, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000a40)=""/70, 0x46}, {&(0x7f0000000ac0)=""/56, 0x38}, {&(0x7f0000000b00)=""/209, 0xd1}], 0x3}}, {{&(0x7f0000000c40), 0x6e, &(0x7f00000011c0)=[{&(0x7f0000000dc0)=""/14, 0xe}, {&(0x7f0000000e00)=""/30, 0x1e}, {&(0x7f0000000e40)=""/25, 0x19}, {&(0x7f0000000e80)=""/245, 0xf5}, {&(0x7f0000000f80)=""/8, 0x8}, {&(0x7f0000002440)=""/4096, 0x1000}, {&(0x7f0000000fc0)=""/230, 0xe6}, {&(0x7f00000010c0)=""/215, 0xd7}], 0x8, &(0x7f0000001240)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{0x0, 0x0, &(0x7f00000056c0)=[{&(0x7f00000012c0)=""/111, 0x6f}, {&(0x7f0000001340)=""/101, 0x65}, {&(0x7f0000003440)=""/157, 0x9d}, {&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000004500)=""/179, 0xb3}, {&(0x7f00000045c0)=""/208, 0xd0}, {&(0x7f00000046c0)=""/4096, 0x1000}], 0x7, &(0x7f00000013c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}}, {{0x0, 0x0, &(0x7f0000005ac0)=[{&(0x7f0000005740)=""/106, 0x6a}, {&(0x7f00000057c0)=""/25, 0x19}, {&(0x7f0000005800)=""/41, 0x29}, {&(0x7f0000005840)=""/169, 0xa9}, {&(0x7f0000005900)=""/166, 0xa6}, {&(0x7f00000059c0)=""/40, 0x28}, {&(0x7f0000005a00)=""/48, 0x30}, {&(0x7f0000005a40)=""/78, 0x4e}], 0x8, &(0x7f0000005b40)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x110}}, {{&(0x7f0000005c80), 0x6e, &(0x7f0000005d00), 0x0, &(0x7f0000005d40)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x100}}, {{&(0x7f0000005e40), 0x6e, &(0x7f0000007140)=[{&(0x7f0000005ec0)=""/52, 0x34}, {&(0x7f0000005f00)=""/83, 0x53}, {&(0x7f0000005f80)=""/50, 0x32}, {&(0x7f0000005fc0)=""/227, 0xe3}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/65, 0x41}], 0x6, &(0x7f00000071c0)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000007240), 0x6e, &(0x7f0000008840)=[{&(0x7f00000072c0)=""/130, 0x82}, {&(0x7f0000007380)=""/73, 0x49}, {&(0x7f0000007400)=""/233, 0xe9}, {&(0x7f0000007500)=""/86, 0x56}, {&(0x7f0000007580)=""/4096, 0x1000}, {&(0x7f0000008580)=""/177, 0xb1}, {&(0x7f0000008640)=""/195, 0xc3}, {&(0x7f0000008740)=""/229, 0xe5}], 0x8, &(0x7f00000088c0)}}], 0x9, 0x0, 0x0) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000008b40), 0x484080, 0x0) sendmsg$nl_generic(r2, &(0x7f0000009dc0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000009d80)={&(0x7f0000008b80)={0x11ec, 0x39, 0x8, 0x70bd29, 0x25dfdbfd, {0x17}, [@typed={0x8, 0x22, 0x0, 0x0, @pid=r3}, @typed={0x4, 0x23}, @nested={0x20, 0x6, 0x0, 0x1, [@typed={0x8, 0x18, 0x0, 0x0, @pid=r4}, @typed={0x14, 0x56, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}]}, @typed={0x8, 0x39, 0x0, 0x0, @pid=r5}, @generic="dc97f8716783baba92320cf125", @typed={0x14, 0x54, 0x0, 0x0, @ipv6=@remote}, @nested={0x117d, 0x3c, 0x0, 0x1, [@generic="e542534d0e22458126589cd4a019ac6433f879a1e5ad08b8da2ea99905c6ccb8ce4a7e913f796ab7cf022cacc7a176d2af9f3b42dcc8e5b3ceccb91e7938856d89819bf1282554dbd72658ca9b582dfb0deb69dced48208ba106198327d6f629059fc13235b294381322ff2d1cd8884dd093472c17bc4e0d16478d6d0793b5718468aa87440a9a85e67b9386a0c5b731cf200c0bd408d3283bf52925975e6b0c63fc2381631c7ad43483f7d2855ea88c0f2476c0a844d2d8550b2818c614223ce44def31d0a2ead51b2ad1e5e905f3a7404256ad8a471f52b53200fb7bf39e231e65d2dc8ec6517e4bd71885ff", @generic="3876c0c693355674b012b6e15559593eda6de5e48bf150148a0effd3786aa9694d864909f1527b796e57a8e4dc9a74d4f96c4ea8e93ce415cfefd22290a31629722f87f50f6a2f008bcadaa7ac8d649d7cde41e1575a24357f4de05bc880fc9adef1a7b91a534c1230248254b8dfbe3867494be60a676664f08e65d4c9de322e0a6e7017", @typed={0x8, 0x29, 0x0, 0x0, @fd=r6}, @generic="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"]}]}, 0x11ec}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) r7 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r8 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r8, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2401.638228] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2401.656271] FAULT_INJECTION: forcing a failure. [ 2401.656271] name failslab, interval 1, probability 0, space 0, times 0 [ 2401.659231] CPU: 0 PID: 33056 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2401.660700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.662460] Call Trace: [ 2401.663027] dump_stack+0x107/0x167 [ 2401.663804] should_fail.cold+0x5/0xa [ 2401.664608] ? jbd2__journal_start+0x190/0x7e0 [ 2401.665565] should_failslab+0x5/0x20 [ 2401.666385] kmem_cache_alloc+0x5b/0x310 [ 2401.667248] jbd2__journal_start+0x190/0x7e0 [ 2401.668179] __ext4_journal_start_sb+0x214/0x390 [ 2401.669178] ext4_file_write_iter+0x1267/0x1530 [ 2401.670171] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2401.671158] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.672282] new_sync_write+0x42c/0x660 [ 2401.673123] ? new_sync_read+0x6f0/0x6f0 [ 2401.673980] ? ksys_write+0x12d/0x260 [ 2401.674793] ? lock_release+0x680/0x680 [ 2401.675631] ? avc_policy_seqno+0x9/0x70 [ 2401.676493] ? selinux_file_permission+0x92/0x520 [ 2401.677540] vfs_write+0x7c0/0xb10 [ 2401.678303] ksys_write+0x12d/0x260 [ 2401.679079] ? __ia32_sys_read+0xb0/0xb0 [ 2401.679941] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.681045] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.682133] do_syscall_64+0x33/0x40 [ 2401.682928] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2401.684010] RIP: 0033:0x7f0068470b19 [ 2401.684793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.688677] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2401.690286] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2401.691810] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2401.693307] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.694818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2401.696325] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2401.826556] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=33055 comm=syz-executor.0 10:53:59 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:53:59 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000402) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:53:59 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007c6) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:53:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:53:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 10) 10:53:59 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2416.333787] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:53:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xf2fd000100000000, 0x3) 10:53:59 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, r1}}, './file1\x00'}) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0/file0\x00', 0x7, 0x1, &(0x7f0000001300)=[{&(0x7f0000000300)="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", 0x1000}], 0x1000, &(0x7f0000001340)=ANY=[@ANYBLOB="73697a653d2d322c687567653d6164766973652c6d70fe0f6f6c3d7072656665723a332f33392c687567653d6e65c9843a4afe959dbe", @ANYRESHEX=r1, @ANYBLOB="2c6d706f6c3d64656661756c743d72656c61746976652c687567653d6e657665722c666f776e65723d6d0a5bd59fe0a904f315271257e098b6a62a7c", @ANYRESDEC, @ANYBLOB=',\x00']) [ 2416.345296] FAULT_INJECTION: forcing a failure. [ 2416.345296] name failslab, interval 1, probability 0, space 0, times 0 [ 2416.348161] CPU: 0 PID: 33271 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2416.349597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2416.351327] Call Trace: [ 2416.351875] dump_stack+0x107/0x167 [ 2416.352630] should_fail.cold+0x5/0xa [ 2416.353419] ? create_object.isra.0+0x3a/0xa30 [ 2416.354364] should_failslab+0x5/0x20 [ 2416.355154] kmem_cache_alloc+0x5b/0x310 [ 2416.356008] create_object.isra.0+0x3a/0xa30 [ 2416.356923] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2416.357993] kmem_cache_alloc+0x159/0x310 [ 2416.358878] jbd2__journal_start+0x190/0x7e0 [ 2416.359819] __ext4_journal_start_sb+0x214/0x390 [ 2416.360820] ext4_file_write_iter+0x1267/0x1530 [ 2416.361795] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2416.362791] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2416.363900] new_sync_write+0x42c/0x660 [ 2416.364737] ? new_sync_read+0x6f0/0x6f0 [ 2416.365585] ? ksys_write+0x12d/0x260 [ 2416.366374] ? lock_release+0x680/0x680 [ 2416.367208] ? avc_policy_seqno+0x9/0x70 [ 2416.368048] ? selinux_file_permission+0x92/0x520 [ 2416.369059] vfs_write+0x7c0/0xb10 [ 2416.369796] ksys_write+0x12d/0x260 [ 2416.370551] ? __ia32_sys_read+0xb0/0xb0 [ 2416.371403] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2416.372497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2416.373577] do_syscall_64+0x33/0x40 sendmmsg$unix(0xffffffffffffffff, &(0x7f00000071c0)=[{{&(0x7f0000000140)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000000200)="a90facb2a8dd25a4306ed6b2a0e287a9b7a13b2ea0cff2253efdfb48ef442785df93517287ee26039f996f12d002da0c2f26970abca4563bb673373de5e69088bd07e2de1af2499d756de2c1151b4d61692f3f592b7e", 0x56}, {&(0x7f0000000400)="d6dc6ba157b50c061609acaac0dad42c0fc1b79816fc2642813d844acfef8355a2b56870fd3290024cea03e01e4463ff418f78a22982909e154c108f0e579274a9078e481dd7938b548adf391dc77927b747ee6b1d792323445a0f75b7a031c351cb4cde835b6e1681eb7446efd9c26db8e63c9553355022bd874ce3b479f6a443f330b7b4b497d2f33044fd10b74258fae0d14e9ab92a69da29bc4da5c1af6e094bb5d3cf87efb1aa612f4857d1e98112794178f60e79baa79ef291d15f2d80781e6261d6c5", 0xc6}, {&(0x7f00000002c0)="27a3", 0x2}, {&(0x7f0000000600)="e3d684dac04d18f133113328c9bffb109d2186c17bf164e2bfe94db257e46818c161edfffa97fcf561fa6994714fe9dd40ff6651934637af6e74a43340dae355e2961154124971623e2a480e88c39b71274a575b3916a371b7b4e1f932bb062b9347772042aef23e3f018607378b39469aff6eea0b59cbc0f456de3ae7a1e60a10648098c629c69cacf61f582c9ad56f334b6ff8796c78d4c3d35f8e56c8201ffbf9f9ee61b91864bcb5a520503a33f9abbace4a1a692d32abbf72c732609e6313ecb84341f30e3b34834adcc775197bd0", 0xd1}, {&(0x7f0000000700)="1580bd51849a2dec8268a0c572c4df2cf896084379796036d0c8130753c9256085bbb16aedf22fa60e7491e44e530d3b8279ddbf42ae979563ab5aab419876b6861e0626c4d36afb921f7fb01c01f170eb0d7dd569ecfd1e02ab783e22ba3d89bb5a19529f70a61b3c4e748d0dafd618f176cee06610b0d3d310cd0994e0925a445771f642d27cba9577ea9e11c1b9692c3cf0afa1de4cecb6d61241e2067eb406293f7bfc47e4642129d5d7bb07e22f0026a62d2a2495386666b73bd1e740ec3a1eded2a2c3ffcc02ed74a99c420d26908f699f164411e4d925b8a3759daf625f5eeba96609a0a8006e7f97f9ec4946", 0xf0}, {&(0x7f0000000800)="bdd1c00b825641b831d7bcf4468c5ecba1c7880d2a16e53c93a388fc475c32fae175c9f43d623908d288c3902c0a7cf2775afb65d47dc0a2d6750bb061f6d8f0028caa797c89c2ed878891463ef2372d749136dedb9273629c043c79480520d730909efc264937e12e1f264ca644bb946c87144d2d67597c62c035347f01b269930c460e99ac0eaea20e86cd3879c83b4cb2693853dc0be2b1df19bb53a85c48a50875fa4579918887bf9882345a901fb099ef91a3d01feed3a3d006794c021fa07566dc56b40b0616d62159757637d615a1cf57d6134abb9ad2e33b5336ab801dfdead1888f9d5e9cf4f3", 0xeb}, {&(0x7f0000000500)="34012054f83e43a0df514beaecbdf110519d2baaec10d73439b51a9667d7559fb804e013affaf3243d4cc8965855bb7052fb7797e7e03ac4eb5570df12", 0x3d}, {&(0x7f0000000900)="d506bdb5d4574b05825903cc82b2f1e523e0ae2dff1bb50fb1b94e904356cacb230b9bc2ff71abdd2825017440d58832017361f8dc12a651acef33525d2c8ec9c2725ccbbe8a7e8ee9fc53f2ff53443d4dfe0ee6e84a1df57a61d02ce596b93ab31c56853ced1d0e3ef2fdf51cc150b256877dfa4aff9bfe36b7234956cf4171ae830c7872708d65f842a589b1086e42d765889c960d934f495e118ee059c2d46655be111c8118a4289814c5ac3a4beb45173d", 0xb3}], 0x9, &(0x7f0000000b00)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x70, 0x40000}}, {{&(0x7f0000000b80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000e80)=[{&(0x7f0000000c00)="459b1c0a1e1afefbb096924412de6ff6d933698fc5a7492d27c412998d212fcf664382ba1ac83b1730f67e520740e5ad5811b6947897aa08ad574f3354a7f3b6b21087f46518bf5cffe576e781303d4b13f8e50fb91632c454403ff7b1921480220280be4aa26aae7cdd78a5be015a9488c462b9e98187c6c1bb4deebddacea0d6579ad0470857542e7aa586f742f9ea6934389e1ff23cfd52515563", 0x9c}, {&(0x7f0000000dc0)="6ba9a71e39a942adac3ad9279b8d5fd44c37e2499eb0c50e9f6efed8bdf20120e43fb98ea36d38a16c77a0cdd5fcda6b128941a3", 0x34}, {&(0x7f0000000e00)="397901d4d987b698420972426d3fb3ccf56f6bc9c5b0fdd902aaf1a8972ae05bc7", 0x21}, {&(0x7f0000000e40)}], 0x4, &(0x7f0000000ec0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x40}}, {{&(0x7f0000000f00)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001100)=[{&(0x7f0000000f80)="35738e5dd5d7c8db1d20698495f7ba1286345ffe1a83ccc1a2a48eb4f9b7d7c707194b8e38cc972f1c48bd9618acb8e6b720de17b44b58571d6bcbf9a47709aaedb3b40d63f6", 0x46}, {&(0x7f0000001000)="c144bf6cf482c209808704f6f39cb75415a6fa9cbdabb4f5494dfb525be47529c8fdec18533bcb47d71ca486b0f52209e92ccc9ee85caadc0d59fd364af407d6f7eb8325f888bd06fab476347c46e767014bf6c6018bd4c6cfe6c19dc396daf7cb8cf517ff6627a392202fd950c6f0fa45b2ad078480510b294e6118b4414eb679a9efefca65a548f09cb07ed3554125c8b7ccf35cb0086abce56cfe3c36636e0f3a9cf5c2289f7cc498a959e8e52cf8bf253b0b6034f3fa639f1c096638c20862ef4ad03e312c7e1164a27725d0acef61c397ee543f7eeed24626f1ee", 0xdd}], 0x2, &(0x7f0000002680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90, 0x887}}, {{&(0x7f0000002740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002840)=[{&(0x7f00000027c0)="a74f996c284de08e13e28c881716a89f48d88ad1af1b3a622b9c0c615b38e3336ab92b75d9865402001e7d0b134120129988cc0b907e995ab585b2a2a81acf4cdd4de4d2038ad259fba78cb3837415913697b6f21bad87", 0x57}], 0x1, &(0x7f0000003240)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}], 0xa0, 0x400000d1}}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000003300)="00fc5cae73d0bc758c2e72cb508329c145ff500feb0ac3c436ce5aa28d799300940ade84cdd1745f76fc9c38e97ca91262694bb4b83f02df334db434e51061f26fc621b449bf2386ad22028f70e9f70c9d7bd4292fd258c1ee1a5ce4450f8c6c1cac5a00f16d818bd07353ac671008c2d973507ec0500efa39f6d9c230e04a65a8418fa2f73ba70ee7f74946b2f0a758af6f7f3133303377f738de0bb841cfedb84d7fbdf5ee04bdac6ca4179e97078fdda5013189304bf9bf8f46557c90aa72079f876267e4cd676875833e381f", 0xce}], 0x1, &(0x7f0000003500)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x100, 0x40}}, {{&(0x7f0000003600)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003840)=[{&(0x7f0000003680)="e393b145b188d05e96dc9ff857c5c6203cc4e47c75f79af190e93b9a0e14dafef3847dedd74bdeb11521d883bc0e73909a9c41c367b43613f018b1982093319057a21ffa0a4690db70ee5299419b2ed72473560c0bb0edb01a49744e1c6a5a0212bff3ee2c0d963d26104aa3716b7e48d3fba34b32d9094f2fc87094d1801a787fd7", 0x82}, {&(0x7f0000003740)="f8e908f4fd1fff790b6849e2af782d7d99ebe04ff13abdb92905e02e800b1b16e79d7a200ac6555098828e5ae53868c0bc0fc69e79fe8eaf8abf98c02931c0f1eda0cd483981f3ab5bfe1580b64144e880ecfb4db4ee1cd4246bf2ec4f597cd09f476fb6a499caa50c1581b5863ec0613b2697b42230c34a7129fda259ea415575983d3f90ab138bfc3fd93da778e25c93cc659e3d141be1fb7169a2b59d5873e80fc87dbb73b29145d7854a0eb77e91febf27fe4a49d30a35744b57976bb5d950a9b4d0b3dcda3380a8a8034e53b4c0bee651156399cffed09f9696c6d55607cea7c02340c05d69413e8f893b1a314013", 0xf1}], 0x2, &(0x7f0000003a80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x4}}, {{&(0x7f0000003b80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000050c0)=[{&(0x7f0000003c00)="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", 0xfd}, {&(0x7f0000003d00)="234d258e7923687414f87019f9689ccec2666aa9214724a5872122baf69490de761d51841d8ed4360be0662eb64ae8d130abc87249b80fdea7deea066c487c2f426b66069568efc8e07e3859fcaf683d0868f77fc00310e74c291b4cca1df1e750cc857901a513c6d87742224ae4803eef1ab07ea7ea75d7394272885c8eaba34584380c74385ab2932529463f2e", 0x8e}, {&(0x7f0000003dc0)="b74f44779b111357d5803b44e4c98479ee97a9efee6d2837174908fba0a140b43e", 0x21}, {&(0x7f0000003e00)="f047494685f2e3d6be58c1433685f7c69b8c69f8dbdd1241d5ded8c6805f2b1bcb1d34b305cfc9fae9a5609b4f774c9289672515d3382c19e2b3adc6e2e4ed931861300844699a219c15682faae8cb3a841297374fd84c8195959d3b562c7292471e5992d7150a76f9fde7b775eded416933af0f740460d185cd565757271693f22acdb283ee964e6ce03eee6ee1f52a624cb64b518c513b78f536e5899fd9158370b799ad661b46e1ac631c008b3a0282c0555eafc38fc5bafe28aba5da4f47ae0d4d5e4612fb9b87c0104cd67e9358e84dbde248ce2446bed59a88", 0xdc}, {&(0x7f0000003f00)="65a5b5affd7ea1befe65afd4ac849ff9f044ba1c52ace51f5fdf351aa49b98687eeb467ad61465bb59cec1d3177dc4cd73324825118ec538ed6171be426f1ebb1fd587525dc0fb447eb961ebb448615a5429fd911f21383472", 0x59}, {&(0x7f0000003f80)="e94652eca6c6b575449e38a06785c1e9caae39f54cc2a9354245af4c5f7c8ef5c690ffdb53c87333ecc7188b51874d1ac6e827d24ad2c49fc69eb692145b6b76", 0x40}, {&(0x7f0000003fc0)="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", 0x1000}, {&(0x7f0000004fc0)="3d733738eecc8b7d8df4721a2d336528f451164c868215f15d3f625d26814d8e735720276e7190093d9406e0362af54053ff33c4581cf054ac6fd1331527068fc35237abe3ac7150777cf7f4272bc1a1ee17d94d0ac9d59e24ce3e3b8581d776a25905d57459f32963d59430ce77ef11cc9f96354ff728fdb262e21dd8d9b236c38e7f1647a979d9b4a476b89dc2cfde0f86385d044db1f4656ffdb237654745b161a6aebbe00b30ccd84baf8ac5a0c080474803a7fd995d9ca80ce78bb88b0b9d", 0xc1}], 0x8, &(0x7f00000051c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x8814}}, {{&(0x7f0000005200)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000005680)=[{&(0x7f0000005280)="34067d60edd3733be3394171d65f", 0xe}, {&(0x7f00000052c0)="21e25b816fbd622c6112f71eb138410a93006c9576f82238db78d3a12145d093bc5be955ecbf008fa50aa7a54d53c114f44e050177761900e4e1ce08c8e53cbfbf7185aec09186f4ae530119cf264a0fdf3faaa473f010e4c7ecfb4d4be568a6d850ad14b4c964ee705d0ba0ba2d2f0888a8e487c1e73ee627f832727d0ee49f9f5e7001722be0848f31dab17134b6cd938625100f8f615d6322324feac408a7506103eedc1cd209d97ca8443c2415a5ea77b64bcc0df87e12d9fff1a8f55c3caf92d925133e688322f72dd60dc4e2a2d891f72f2635826688fcaee3bcbf18", 0xdf}, {&(0x7f00000053c0)="f447578416cc56b61aacefd624358bcaff84d15b93ce77b360705ddd7c01e121c057bf1e639e8d938429f0de6e38bede8a4bdc4e7a550083fd26d490314d12e9f421531475b4ddd91cd71fc4caee0475d738df2c344c60a0abe230e2bc8191d2c380a8f1f0cc924cce1a70b40be4e2cb9d78150be43fac3e04c6995c31f2e62ed9e3dc70aa60ba243479", 0x8a}, {&(0x7f0000005480)="85e54dbab4974fa18a322cd113455df7926f6e6bb353ca6d705f5a9cde7b6479b9662afdb36f3da09975bf010fe518b346578816bf592eee9c5b4ae9edf3d71e0d7fc82ea237d187e52190738440d6a07660cc3f02c34824ab2f6415dc3195d2dba8f3c8ef9bfb3a50982ca5a5d3ba3486ea978845860f6eefd27739ebe0a6f4b9cc5743ca752b595def143735fe2f7017eca9d8cfb1deb7eb073c29be56454274db31d07b56405a56b130f3e12e5f6d03fd83f61238eb16576e10730b992cb5d6581c3896a3adfb33483e050ae6e67746b23b906af8b360f959e45c1b693f16c3fef2c096", 0xe5}, {&(0x7f0000005580)="2a0e04222e720a932cc63e4c0d3677384551a45cb5ffda66c5f352c44fdcfea885d88ec655bfb087a1e1cfa3a77397de4694dad11f660672ece17570e22a6cca52522d6364c4b723382bebd8be44f5324fec77d8d0362f289285022c89af6913b588569835d35c7df65d2cdce36c9bbff7432d302db16fdf281e445300ea012e4ba362d792eb1535713918f53a1a7b7fca8173dd17d98a87c80c10a897d5e86dd11204c724b0e94d451ad04620e7483433d99858745a14d55a8ea2f5a5dca95ccac4062dd1b3b382f207b557e4babfc47d4edf0700", 0xd5}], 0x5, &(0x7f0000005840)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0, 0x4006}}, {{&(0x7f0000005900)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005c80)=[{&(0x7f0000005980)="628c361f7a1a220faa62b80611d4128c470d158fd9714fd952486e1c4f68057f9147c528e3c64efc59c71da6c907ebecc025ea19f61ba14aadcb34f2ecc08b8993ad75602688e5db12d289211703f582612e3a94e563d365c0056058bd79bcecade029f7cdd7a7d915229b3a509d49f9086395a115d04da92284806f25a72cd11a3365ec280d6f24058f62cac60c9d1dd246d24f5050e88f651537", 0x9b}, {&(0x7f0000005a40)="7f781272a670f3aad06099141cc95fdc83d75554d68b32c2a56b0c14442da5b6ec293e4c7f011bf116b71a8d45dff9929851e2ed44f3d55321cfd437873a9d1aebf69d5e57b236a663c7a019db60ece912fb784e", 0x54}, {&(0x7f0000005ac0)="8816e1e3db3d7fd480ad8a971a5f895ed63c8271c1cec2913edfaad1", 0x1c}, {&(0x7f0000005b00)="d3207b30877519967c2d4f87e61fba1472c05292d4c6bd1e17d5459582abd24cd3ec1cabcd6eb6d921637b059550dc19e61c749f5452984764881d61beb8f8460896ba74c75649d0437dc168652df04c6eeac40ddf7d9d72d01a8f128fec168d5fc1d4b2a6b191e8627cf1040cd96d1b1baf57e687b847a352b3579a65b808d3c233a9cf4d900338668151dc6b0eb65541f0899b1b8f3c53eb2fadbe5a9da0683c36efffb956fe8ee703e3439f63e0863d7ff10d6582239f8be764c42f8bfdcb5b4a586e9a3e85575c187e114cfa821887", 0xd1}, {&(0x7f0000005c00)="d06c9efabb42de2fd4e0ed5a6a221ebe92398fb4205f02a687e88572854eb918edf5e0c9c23455fb720e43fe4ec269ba70052ee2fa7feb49cb5bdff916766be2bfe547b65754d0ec86234d2a6c31f72127dbc908b00494f22f4e6badb84ad1568300de2947a8e5f258440e05e800b22f84fb2353df9e247fee", 0x79}], 0x5, 0x0, 0x0, 0x400c041}}, {{&(0x7f0000005d00)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000007100)=[{&(0x7f0000005d80)="7ac4575bf04d69b22af6f26336bcfa04b2bcab3363dd3deb47da182e5ca80ebca2d6b21b3b5b04b20ba5a39bb9", 0x2d}, {&(0x7f0000005dc0)="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", 0x1000}, {&(0x7f0000006dc0)="564725d5b1108580c9f678afcce1d4462cc06c4e8f5bd216f0147a4d71991e00a06afecb97d2e175986306202b26c8486d9da22eea425e4c4ab2026a60e2e608d91488f4310193ab8b61a57520c646cfc96b0890f94b977fe4a4191c6c3f4268499902b3fb217892047f6941a6e9fcff99352bf66739d81043edfccefc21c5b85450ee738aabe5adc57a7e43fa4d32517b14b1641d78288106066c869504348db0384be91f0226e89b9ef8f0553da6e6104ba654b31e07fc144206d657f32cc4c2089b1fbe4a", 0xc6}, {&(0x7f0000006ec0)="50f00ee1589ef0c3137ee259d0951672164553ef87b50e817127577cc9ab00298ec4818f7b673d3f3a8d2a14ad17a65a194c11aa0b00c540fd", 0x39}, {&(0x7f0000006f00)="53e959aa5d17597ba272e834edff17e62efd5de9366ec73cb2262ab0addfb3fa5d508b26d95d6b6f109d984036c016a4125848f5823dfa45d2fa38cf37dfafaeb8245cc8fb75647dbc55c8e70eaab22e3444fe50f218b7bca05526e1298b9f0642d28aa7924d828d95483cbb486d2fcb02c9af8f8beb92ff494c5d3c150963d3700b5f48f42ec49753c7520cc9233c8b394377ba81e0", 0x96}, {&(0x7f0000006fc0)="917d1b8679e185fa8571c416958aeba61d0cfce6", 0x14}, {&(0x7f0000007000)="831f8a31d5331e13c250a9ade5239330c3147213c6084de6e874ab2f5e79103bf820f440c9df6e54f58ed5dd3b28bde813a00c13b15a0dad56a73a2c005a99cc3e03ce778c66cfa9d28b", 0x4a}, {&(0x7f0000007080)="6a5cc630ef9c2adce3748b28d23eee4fdac51fe732c3d2f011f33540aa056d34e4fcd0337f99d7c1c4b8087761e9c836bcb5aee306d38177e028c552e5e64192fe4afb77b3545fe3bc956a5c0f982d0a8fdcb2cb443c966f283e369b83ac0f0ce45bc2b3", 0x64}], 0x8, &(0x7f0000007180)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r0, r1}}}], 0x38, 0x81}}], 0xa, 0x4881) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r5 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r5, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r3, 0x8030942b, &(0x7f0000000100)={0x100000001, {0xe42c095470d25373, 0x3, 0x83c2, 0x502d, 0x8}}) lseek(r2, 0x0, 0x3) [ 2416.374337] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2416.375472] RIP: 0033:0x7f0068470b19 [ 2416.376249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2416.380095] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2416.381690] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2416.383195] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2416.384685] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2416.386162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2416.387642] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:53:59 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:53:59 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000404) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2416.391046] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2416.422130] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=33306 comm=syz-executor.7 [ 2416.436134] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2416.463276] loop0: detected capacity change from 0 to 4096 10:53:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xfeffffff00000000, 0x3) [ 2416.556707] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2416.588901] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=33591 comm=syz-executor.7 [ 2416.592677] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2431.493119] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:54:14 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:54:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000600)={0xaea7, {{0xa, 0x4e24, 0x7, @private1, 0x800}}, 0x0, 0x5, [{{0xa, 0x4e23, 0x1, @remote, 0x200}}, {{0xa, 0x4e21, 0x10000, @ipv4={'\x00', '\xff\xff', @local}, 0xfff}}, {{0xa, 0x4e24, 0x7fffffff, @remote, 0x100}}, {{0xa, 0x4e20, 0x5, @ipv4={'\x00', '\xff\xff', @empty}, 0x40}}, {{0xa, 0x4e21, 0xffff, @loopback, 0x1}}]}, 0x310) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc020700000000000000009e669aefb8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa783450000ca6d8399fbb3687942e1041361dc4b7cad8de866a4a165b7d28ad5d4bb7918bebafcb320ac0ac88c497aa2ab7324888c4efcc6907c2484269d665ac895d5ece8ed83995bc6d014f1cf49a4bc9c5b6fea7b3ea532aa51a2e41ea8298c816a6647e8fdf1691a60bf323bfed2896909953962e6e10c0393add6d952a74ab9e1"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000080)={0x0, 0x0}) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000940)={0x0, 0x0, 0x8, 0x0, '\x00', [{0x0, 0xfffffffc, 0x2, 0x7, 0x7, 0x1}, {0x1, 0x7, 0x5, 0x1, 0x9, 0x5}], ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r4 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:54:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 11) 10:54:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:54:14 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x8000040c) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:54:14 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007cc) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:54:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2431.507621] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2431.515676] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=33627 comm=syz-executor.7 lseek(r0, 0xffffffff00000000, 0x3) 10:54:14 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2431.519292] FAULT_INJECTION: forcing a failure. [ 2431.519292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2431.521315] CPU: 1 PID: 33609 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2431.522284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2431.523506] Call Trace: [ 2431.523880] dump_stack+0x107/0x167 [ 2431.524405] should_fail.cold+0x5/0xa [ 2431.524941] __alloc_pages_nodemask+0x182/0x600 [ 2431.525599] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 2431.526454] ? find_get_entry+0x2c8/0x740 [ 2431.527053] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2431.527795] ? mark_lock+0xf5/0x2df0 [ 2431.528322] alloc_pages_current+0x187/0x280 [ 2431.528943] __page_cache_alloc+0x2d2/0x360 [ 2431.529551] pagecache_get_page+0x2c7/0xc80 [ 2431.530159] ? current_time+0x72/0x2c0 [ 2431.530711] grab_cache_page_write_begin+0x64/0xa0 [ 2431.531396] ext4_da_write_begin+0x2f3/0xd40 [ 2431.532019] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2431.532767] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2431.533493] ? ext4_write_begin+0x10f0/0x10f0 [ 2431.534118] ? copyout_mc+0x140/0x140 [ 2431.534668] ? current_time+0x2bf/0x2c0 [ 2431.535240] generic_perform_write+0x20a/0x4f0 [ 2431.535903] ? page_cache_prev_miss+0x310/0x310 [ 2431.536589] ? down_write_killable+0x180/0x180 [ 2431.537235] ext4_buffered_write_iter+0x232/0x4a0 [ 2431.537914] ext4_file_write_iter+0xccd/0x1530 [ 2431.538574] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2431.539226] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2431.539965] new_sync_write+0x42c/0x660 [ 2431.540525] ? new_sync_read+0x6f0/0x6f0 [ 2431.541089] ? ksys_write+0x12d/0x260 [ 2431.541631] ? lock_release+0x680/0x680 [ 2431.542191] ? avc_policy_seqno+0x9/0x70 [ 2431.542762] ? selinux_file_permission+0x92/0x520 [ 2431.543457] vfs_write+0x7c0/0xb10 [ 2431.543952] ksys_write+0x12d/0x260 [ 2431.544456] ? __ia32_sys_read+0xb0/0xb0 [ 2431.545023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2431.545759] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2431.546475] do_syscall_64+0x33/0x40 [ 2431.547004] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2431.547713] RIP: 0033:0x7f0068470b19 [ 2431.548237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2431.550804] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2431.551866] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2431.552858] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2431.553843] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2431.554836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2431.555827] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2431.570782] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2431.581301] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=33607 comm=syz-executor.0 10:54:15 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007ce) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:54:15 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000415) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:54:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x2) 10:54:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x194) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2431.760680] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:54:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:54:15 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007d0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2431.798565] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=34126 comm=syz-executor.7 [ 2431.834867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=34137 comm=syz-executor.0 [ 2431.838105] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:54:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 12) 10:54:15 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2431.850941] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2431.852021] FAULT_INJECTION: forcing a failure. [ 2431.852021] name failslab, interval 1, probability 0, space 0, times 0 [ 2431.854265] CPU: 1 PID: 34139 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2431.855109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2431.856124] Call Trace: [ 2431.856448] dump_stack+0x107/0x167 [ 2431.856889] should_fail.cold+0x5/0xa [ 2431.857351] ? create_object.isra.0+0x3a/0xa30 [ 2431.857906] should_failslab+0x5/0x20 [ 2431.858381] kmem_cache_alloc+0x5b/0x310 [ 2431.858887] create_object.isra.0+0x3a/0xa30 [ 2431.859414] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2431.860025] kmem_cache_alloc+0x159/0x310 [ 2431.860531] jbd2__journal_start+0x190/0x7e0 [ 2431.861068] __ext4_journal_start_sb+0x214/0x390 [ 2431.861649] ext4_dirty_inode+0xbc/0x130 [ 2431.862142] ? ext4_setattr+0x20f0/0x20f0 [ 2431.862656] __mark_inode_dirty+0x492/0xd40 [ 2431.863182] generic_update_time+0x21c/0x370 [ 2431.863718] file_update_time+0x43a/0x520 [ 2431.864216] ? evict_inodes+0x470/0x470 [ 2431.864694] ? down_write_killable+0x180/0x180 [ 2431.865249] file_modified+0x7d/0xa0 [ 2431.865698] ext4_buffered_write_iter+0xf9/0x4a0 [ 2431.866274] ext4_file_write_iter+0xccd/0x1530 [ 2431.866840] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2431.867400] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2431.868030] new_sync_write+0x42c/0x660 [ 2431.868509] ? new_sync_read+0x6f0/0x6f0 [ 2431.869000] ? ksys_write+0x12d/0x260 [ 2431.869461] ? lock_release+0x680/0x680 [ 2431.869941] ? avc_policy_seqno+0x9/0x70 [ 2431.870461] ? selinux_file_permission+0x92/0x520 [ 2431.871185] vfs_write+0x7c0/0xb10 [ 2431.871617] ksys_write+0x12d/0x260 [ 2431.872054] ? __ia32_sys_read+0xb0/0xb0 [ 2431.872544] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2431.873178] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2431.873803] do_syscall_64+0x33/0x40 [ 2431.874259] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2431.874882] RIP: 0033:0x7f0068470b19 [ 2431.875327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2431.877516] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2431.878420] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2431.879272] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2431.880116] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2431.880961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2431.881803] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:54:28 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:54:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3a9b63490ab816e6307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x3c) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x1c, r6, 0x200, 0x70bd2d, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000010) sendmsg$TIPC_CMD_SET_NODE_ADDR(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r6, 0x100, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x6}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4000) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r6, 0x1, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x4800a}, 0x4000080) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:54:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 13) 10:54:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:54:28 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007d2) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:54:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x4) 10:54:28 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:54:28 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000500) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2445.642993] FAULT_INJECTION: forcing a failure. [ 2445.642993] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2445.645931] CPU: 1 PID: 34458 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2445.647493] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2445.649339] Call Trace: [ 2445.649931] dump_stack+0x107/0x167 [ 2445.650767] should_fail.cold+0x5/0xa [ 2445.651625] __alloc_pages_nodemask+0x182/0x600 [ 2445.652664] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 2445.654022] ? find_get_entry+0x2c8/0x740 [ 2445.654952] ? __kasan_slab_free+0x122/0x160 [ 2445.655951] alloc_pages_current+0x187/0x280 [ 2445.656931] __page_cache_alloc+0x2d2/0x360 [ 2445.657895] pagecache_get_page+0x2c7/0xc80 [ 2445.658861] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 2445.659969] grab_cache_page_write_begin+0x64/0xa0 [ 2445.661072] ext4_da_write_begin+0x2f3/0xd40 [ 2445.662066] ? ext4_write_begin+0x10f0/0x10f0 [ 2445.663071] ? copyout_mc+0x140/0x140 [ 2445.663926] ? ext4_dirty_inode+0x107/0x130 [ 2445.664891] ? __mark_inode_dirty+0x12e/0xd40 [ 2445.665897] generic_perform_write+0x20a/0x4f0 [ 2445.666937] ? page_cache_prev_miss+0x310/0x310 [ 2445.667976] ? down_write_killable+0x180/0x180 [ 2445.669019] ext4_buffered_write_iter+0x232/0x4a0 [ 2445.670101] ext4_file_write_iter+0xccd/0x1530 [ 2445.671149] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2445.672172] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2445.673351] new_sync_write+0x42c/0x660 [ 2445.674240] ? new_sync_read+0x6f0/0x6f0 [ 2445.675151] ? ksys_write+0x12d/0x260 [ 2445.676008] ? lock_release+0x680/0x680 [ 2445.676895] ? avc_policy_seqno+0x9/0x70 [ 2445.677800] ? selinux_file_permission+0x92/0x520 [ 2445.678910] vfs_write+0x7c0/0xb10 [ 2445.679711] ksys_write+0x12d/0x260 [ 2445.680524] ? __ia32_sys_read+0xb0/0xb0 [ 2445.681441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2445.682610] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2445.683778] do_syscall_64+0x33/0x40 [ 2445.684618] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2445.685759] RIP: 0033:0x7f0068470b19 [ 2445.686595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2445.690722] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2445.692442] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2445.694031] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2445.695634] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2445.697228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2445.698843] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2445.711685] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2445.716105] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2445.736627] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=34570 comm=syz-executor.7 [ 2445.743249] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2445.768984] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=34612 comm=syz-executor.0 10:54:29 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000600) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:54:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:54:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0xb) [ 2445.817816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=34612 comm=syz-executor.0 [ 2445.836799] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:54:29 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007d4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2445.861169] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2445.871822] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=34727 comm=syz-executor.0 [ 2445.905146] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=34752 comm=syz-executor.7 [ 2445.923500] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:54:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x1, {0x5c6, {0x20, 0x1, 0x2}, 0x50, r2, 0xee01, 0x100000000, 0x1ff, 0x4, 0x3, 0x4, 0x6, 0x1, 0x8, 0x4, 0x0, 0xfffffffffffffff7, 0x10000, 0x20, 0x3f, 0x7ff}}, 0xa0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) lstat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000004c0)) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r5 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r5, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:54:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 14) 10:54:29 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007b8) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:54:29 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(0x0, &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:54:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:54:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x10) [ 2446.080842] FAULT_INJECTION: forcing a failure. [ 2446.080842] name failslab, interval 1, probability 0, space 0, times 0 [ 2446.083470] CPU: 1 PID: 34866 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2446.084929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2446.086676] Call Trace: [ 2446.087251] dump_stack+0x107/0x167 [ 2446.088021] should_fail.cold+0x5/0xa [ 2446.088825] ? xas_alloc+0x336/0x440 [ 2446.089619] should_failslab+0x5/0x20 [ 2446.090424] kmem_cache_alloc+0x5b/0x310 [ 2446.091287] ? try_charge+0x62c/0x1160 [ 2446.092117] xas_alloc+0x336/0x440 [ 2446.092871] xas_create+0x34a/0x10d0 [ 2446.093671] xas_store+0x8c/0x1c40 [ 2446.094420] ? xas_find_conflict+0x4b5/0xa70 [ 2446.095365] __add_to_page_cache_locked+0x708/0xc80 [ 2446.096426] ? file_write_and_wait_range+0x130/0x130 [ 2446.097498] ? memcg_drain_all_list_lrus+0x720/0x720 [ 2446.098583] ? find_get_entry+0x2c8/0x740 [ 2446.099458] ? __kasan_slab_free+0x122/0x160 [ 2446.100385] add_to_page_cache_lru+0xe6/0x2e0 [ 2446.101337] ? add_to_page_cache_locked+0x40/0x40 [ 2446.102355] ? __page_cache_alloc+0x10d/0x360 [ 2446.103318] pagecache_get_page+0x38b/0xc80 [ 2446.104225] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 2446.105261] grab_cache_page_write_begin+0x64/0xa0 [ 2446.106299] ext4_da_write_begin+0x2f3/0xd40 [ 2446.107250] ? ext4_write_begin+0x10f0/0x10f0 [ 2446.108195] ? copyout_mc+0x140/0x140 [ 2446.108993] ? ext4_dirty_inode+0x107/0x130 [ 2446.109904] ? __mark_inode_dirty+0x12e/0xd40 [ 2446.110862] generic_perform_write+0x20a/0x4f0 [ 2446.111846] ? page_cache_prev_miss+0x310/0x310 [ 2446.112849] ext4_buffered_write_iter+0x232/0x4a0 [ 2446.113860] ? ext4_buffered_write_iter+0x2/0x4a0 [ 2446.114889] ext4_file_write_iter+0xccd/0x1530 [ 2446.115871] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2446.116838] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2446.117948] new_sync_write+0x42c/0x660 [ 2446.118800] ? new_sync_read+0x6f0/0x6f0 [ 2446.119657] ? ksys_write+0x12d/0x260 [ 2446.120458] ? lock_release+0x680/0x680 [ 2446.121293] ? avc_policy_seqno+0x9/0x70 [ 2446.122154] ? selinux_file_permission+0x92/0x520 [ 2446.123196] vfs_write+0x7c0/0xb10 [ 2446.123960] ksys_write+0x12d/0x260 [ 2446.124734] ? __ia32_sys_read+0xb0/0xb0 [ 2446.125603] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2446.126712] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2446.127820] do_syscall_64+0x33/0x40 [ 2446.128605] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2446.129695] RIP: 0033:0x7f0068470b19 [ 2446.130495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2446.134477] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2446.136084] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2446.137586] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2446.139109] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2446.140611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2446.142123] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2446.160626] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2446.163048] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2446.179209] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=34903 comm=syz-executor.7 [ 2446.185415] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:54:45 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(0x0, &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:54:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 15) 10:54:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0xfffffffe) 10:54:45 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2462.281112] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:54:45 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007bd) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:54:45 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007d6) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:54:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x105) r2 = socket$netlink(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x20, 0x3c, 0x0, 0x70bd25, 0x25dfdbfe, {0x11}, [@nested={0xc, 0x89, 0x0, 0x1, [@typed={0x8, 0x8c, 0x0, 0x0, @uid=0xffffffffffffffff}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008000}, 0xc040) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r4 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xd, 0x80010, r1, 0x147ec000) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) openat(r5, &(0x7f0000000100)='./file0\x00', 0x400040, 0x4) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:54:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) [ 2462.291853] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2462.295861] FAULT_INJECTION: forcing a failure. [ 2462.295861] name failslab, interval 1, probability 0, space 0, times 0 [ 2462.298358] CPU: 0 PID: 35021 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2462.299903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2462.301760] Call Trace: [ 2462.302354] dump_stack+0x107/0x167 [ 2462.303183] should_fail.cold+0x5/0xa [ 2462.304032] ? create_object.isra.0+0x3a/0xa30 [ 2462.305048] should_failslab+0x5/0x20 [ 2462.305900] kmem_cache_alloc+0x5b/0x310 [ 2462.306812] create_object.isra.0+0x3a/0xa30 [ 2462.308025] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2462.309171] kmem_cache_alloc+0x159/0x310 [ 2462.310100] xas_alloc+0x336/0x440 [ 2462.310911] xas_create+0x34a/0x10d0 [ 2462.311761] xas_store+0x8c/0x1c40 [ 2462.312557] ? xas_find_conflict+0x4b5/0xa70 [ 2462.313556] __add_to_page_cache_locked+0x708/0xc80 [ 2462.314676] ? file_write_and_wait_range+0x130/0x130 [ 2462.315824] ? memcg_drain_all_list_lrus+0x720/0x720 [ 2462.316959] ? find_get_entry+0x2c8/0x740 [ 2462.317882] ? __kasan_slab_free+0x122/0x160 [ 2462.318869] add_to_page_cache_lru+0xe6/0x2e0 [ 2462.319889] ? add_to_page_cache_locked+0x40/0x40 [ 2462.320982] ? __page_cache_alloc+0x10d/0x360 [ 2462.321988] pagecache_get_page+0x38b/0xc80 [ 2462.322963] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 2462.324100] grab_cache_page_write_begin+0x64/0xa0 [ 2462.325197] ext4_da_write_begin+0x2f3/0xd40 [ 2462.326191] ? ext4_write_begin+0x10f0/0x10f0 [ 2462.327200] ? copyout_mc+0x140/0x140 [ 2462.328047] ? ext4_dirty_inode+0x107/0x130 [ 2462.329014] ? __mark_inode_dirty+0x12e/0xd40 [ 2462.330019] generic_perform_write+0x20a/0x4f0 [ 2462.331055] ? page_cache_prev_miss+0x310/0x310 [ 2462.332101] ? down_write_killable+0x180/0x180 [ 2462.333142] ext4_buffered_write_iter+0x232/0x4a0 [ 2462.334225] ext4_file_write_iter+0xccd/0x1530 [ 2462.335301] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2462.336331] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2462.337515] new_sync_write+0x42c/0x660 [ 2462.338403] ? new_sync_read+0x6f0/0x6f0 [ 2462.339321] ? ksys_write+0x12d/0x260 [ 2462.340177] ? lock_release+0x680/0x680 [ 2462.341066] ? avc_policy_seqno+0x9/0x70 [ 2462.341977] ? selinux_file_permission+0x92/0x520 [ 2462.343086] vfs_write+0x7c0/0xb10 [ 2462.343892] ksys_write+0x12d/0x260 [ 2462.344722] ? __ia32_sys_read+0xb0/0xb0 [ 2462.345646] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2462.346823] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2462.347989] do_syscall_64+0x33/0x40 [ 2462.348826] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2462.349971] RIP: 0033:0x7f0068470b19 [ 2462.350800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2462.354932] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2462.356632] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2462.358223] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2462.359816] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2462.361435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2462.363036] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2462.369896] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=35083 comm=syz-executor.7 [ 2462.387026] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2462.407660] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2462.410295] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=60 sclass=netlink_xfrm_socket pid=35025 comm=syz-executor.0 [ 2462.438157] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=60 sclass=netlink_xfrm_socket pid=35025 comm=syz-executor.0 10:54:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 10:54:45 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007da) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2462.554779] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2462.599580] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:54:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:54:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 16) 10:54:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000140)=0x8, 0x4) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x3c) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x1c, r5, 0x200, 0x70bd2d, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000010) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r5, 0x100, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x6}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4000) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r5, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x22}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r6 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r6, {0xfffffffffffffff8}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:54:46 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007bf) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:54:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 10:54:46 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(0x0, &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) [ 2462.723017] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=35542 comm=syz-executor.0 [ 2462.747195] FAULT_INJECTION: forcing a failure. [ 2462.747195] name failslab, interval 1, probability 0, space 0, times 0 [ 2462.749692] CPU: 0 PID: 35531 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2462.751244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2462.753109] Call Trace: [ 2462.753702] dump_stack+0x107/0x167 [ 2462.754528] should_fail.cold+0x5/0xa [ 2462.755390] ? xas_alloc+0x336/0x440 [ 2462.756225] should_failslab+0x5/0x20 [ 2462.757074] kmem_cache_alloc+0x5b/0x310 [ 2462.757984] xas_alloc+0x336/0x440 [ 2462.758781] xas_create+0x34a/0x10d0 [ 2462.759646] xas_store+0x8c/0x1c40 [ 2462.760442] ? xas_find_conflict+0x4b5/0xa70 [ 2462.761435] __add_to_page_cache_locked+0x708/0xc80 [ 2462.762555] ? file_write_and_wait_range+0x130/0x130 [ 2462.763707] ? memcg_drain_all_list_lrus+0x720/0x720 [ 2462.764837] ? find_get_entry+0x2c8/0x740 [ 2462.765762] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2462.766968] add_to_page_cache_lru+0xe6/0x2e0 [ 2462.767973] ? add_to_page_cache_locked+0x40/0x40 [ 2462.769050] ? __page_cache_alloc+0x10d/0x360 [ 2462.770062] pagecache_get_page+0x38b/0xc80 [ 2462.771041] ? current_time+0x72/0x2c0 [ 2462.771914] grab_cache_page_write_begin+0x64/0xa0 [ 2462.773008] ext4_da_write_begin+0x2f3/0xd40 [ 2462.773999] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2462.775187] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2462.776345] ? ext4_write_begin+0x10f0/0x10f0 [ 2462.777340] ? copyout_mc+0x140/0x140 [ 2462.778187] ? current_time+0x2bf/0x2c0 [ 2462.779088] generic_perform_write+0x20a/0x4f0 [ 2462.780127] ? page_cache_prev_miss+0x310/0x310 [ 2462.781171] ? down_write_killable+0x180/0x180 [ 2462.782205] ext4_buffered_write_iter+0x232/0x4a0 [ 2462.783298] ext4_file_write_iter+0xccd/0x1530 [ 2462.784339] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2462.785363] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2462.786548] new_sync_write+0x42c/0x660 [ 2462.787448] ? new_sync_read+0x6f0/0x6f0 [ 2462.788356] ? ksys_write+0x12d/0x260 [ 2462.789217] ? lock_release+0x680/0x680 [ 2462.790106] ? avc_policy_seqno+0x9/0x70 [ 2462.791019] ? selinux_file_permission+0x92/0x520 [ 2462.792116] vfs_write+0x7c0/0xb10 [ 2462.792921] ksys_write+0x12d/0x260 [ 2462.793733] ? __ia32_sys_read+0xb0/0xb0 [ 2462.794645] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2462.795821] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2462.796979] do_syscall_64+0x33/0x40 [ 2462.797809] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2462.798957] RIP: 0033:0x7f0068470b19 [ 2462.799792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2462.803915] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2462.805616] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2462.807205] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2462.808802] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2462.810394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2462.811998] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2462.841627] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=35550 comm=syz-executor.7 [ 2462.848230] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=35547 comm=syz-executor.0 [ 2462.854562] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=35542 comm=syz-executor.0 [ 2462.861214] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2462.867602] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:55:01 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007dc) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4, 0x1}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:55:01 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', 0x0, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:55:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 17) 10:55:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) recvmsg$unix(r2, &(0x7f0000000240)={&(0x7f0000000140), 0x6e, &(0x7f0000000200)=[{&(0x7f0000000080)=""/35, 0x23}], 0x1, &(0x7f0000000400)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x110}, 0x100) openat(r3, &(0x7f00000002c0)='./file0\x00', 0x10200, 0x8) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r4 = memfd_create(&(0x7f0000000100)='bu\xe4\xaaR\xf5', 0x1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffffbff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:55:01 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:55:01 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007c3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x0) [ 2477.866266] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2477.875943] FAULT_INJECTION: forcing a failure. [ 2477.875943] name failslab, interval 1, probability 0, space 0, times 0 [ 2477.878343] CPU: 0 PID: 35768 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2477.879847] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2477.881869] Call Trace: [ 2477.882437] dump_stack+0x107/0x167 [ 2477.883253] should_fail.cold+0x5/0xa [ 2477.884088] ? create_object.isra.0+0x3a/0xa30 [ 2477.885077] should_failslab+0x5/0x20 [ 2477.885911] kmem_cache_alloc+0x5b/0x310 [ 2477.886791] create_object.isra.0+0x3a/0xa30 [ 2477.887798] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2477.888896] kmem_cache_alloc+0x159/0x310 [ 2477.889799] xas_alloc+0x336/0x440 [ 2477.890574] xas_create+0x34a/0x10d0 [ 2477.891411] xas_store+0x8c/0x1c40 [ 2477.892190] ? xas_find_conflict+0x4b5/0xa70 [ 2477.893149] __add_to_page_cache_locked+0x708/0xc80 [ 2477.894230] ? file_write_and_wait_range+0x130/0x130 [ 2477.895338] ? memcg_drain_all_list_lrus+0x720/0x720 [ 2477.896446] ? find_get_entry+0x2c8/0x740 [ 2477.897331] ? __kasan_slab_free+0x122/0x160 [ 2477.898285] add_to_page_cache_lru+0xe6/0x2e0 [ 2477.899270] ? add_to_page_cache_locked+0x40/0x40 [ 2477.900318] ? __page_cache_alloc+0x10d/0x360 [ 2477.901296] pagecache_get_page+0x38b/0xc80 [ 2477.902227] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 2477.903325] grab_cache_page_write_begin+0x64/0xa0 [ 2477.904387] ext4_da_write_begin+0x2f3/0xd40 [ 2477.905352] ? ext4_write_begin+0x10f0/0x10f0 [ 2477.906308] ? copyout_mc+0x140/0x140 [ 2477.907141] ? ext4_dirty_inode+0x107/0x130 [ 2477.908085] ? __mark_inode_dirty+0x12e/0xd40 [ 2477.909059] generic_perform_write+0x20a/0x4f0 [ 2477.910053] ? page_cache_prev_miss+0x310/0x310 [ 2477.911068] ? down_write_killable+0x180/0x180 [ 2477.912062] ext4_buffered_write_iter+0x232/0x4a0 [ 2477.913100] ext4_file_write_iter+0xccd/0x1530 [ 2477.914086] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2477.915071] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2477.916204] new_sync_write+0x42c/0x660 [ 2477.917052] ? new_sync_read+0x6f0/0x6f0 [ 2477.917928] ? ksys_write+0x12d/0x260 [ 2477.918751] ? lock_release+0x680/0x680 [ 2477.919607] ? avc_policy_seqno+0x9/0x70 [ 2477.920478] ? selinux_file_permission+0x92/0x520 [ 2477.921534] vfs_write+0x7c0/0xb10 [ 2477.922299] ksys_write+0x12d/0x260 [ 2477.923101] ? __ia32_sys_read+0xb0/0xb0 [ 2477.923985] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2477.925115] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2477.926220] do_syscall_64+0x33/0x40 [ 2477.927037] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2477.928145] RIP: 0033:0x7f0068470b19 [ 2477.928948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2477.932928] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2477.934883] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2477.936870] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2477.938515] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2477.940079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2477.941614] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2477.978071] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2478.030269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=35784 comm=syz-executor.0 10:55:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x0) 10:55:01 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2478.094397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=36147 comm=syz-executor.7 [ 2478.107163] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2478.125012] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:55:01 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007de) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x0) 10:55:01 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007c5) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 18) 10:55:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2478.215943] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:55:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r0, 0x0, 0x3) [ 2478.233267] FAULT_INJECTION: forcing a failure. [ 2478.233267] name failslab, interval 1, probability 0, space 0, times 0 [ 2478.234837] CPU: 1 PID: 36200 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2478.235795] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2478.236768] Call Trace: [ 2478.237083] dump_stack+0x107/0x167 [ 2478.237513] should_fail.cold+0x5/0xa [ 2478.237990] ? jbd2__journal_start+0x190/0x7e0 [ 2478.238520] should_failslab+0x5/0x20 [ 2478.238967] kmem_cache_alloc+0x5b/0x310 [ 2478.239480] jbd2__journal_start+0x190/0x7e0 [ 2478.239996] __ext4_journal_start_sb+0x214/0x390 [ 2478.240586] ext4_da_write_begin+0x51f/0xd40 [ 2478.241101] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2478.241713] ? ext4_write_begin+0x10f0/0x10f0 [ 2478.242274] ? copyout_mc+0x140/0x140 [ 2478.242721] ? current_time+0x2bf/0x2c0 [ 2478.243202] generic_perform_write+0x20a/0x4f0 [ 2478.243748] ? page_cache_prev_miss+0x310/0x310 [ 2478.244334] ? down_write_killable+0x180/0x180 [ 2478.244875] ext4_buffered_write_iter+0x232/0x4a0 [ 2478.245433] ext4_file_write_iter+0xccd/0x1530 [ 2478.245980] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2478.246514] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2478.247176] new_sync_write+0x42c/0x660 [ 2478.247638] ? new_sync_read+0x6f0/0x6f0 [ 2478.248141] ? ksys_write+0x12d/0x260 [ 2478.248583] ? lock_release+0x680/0x680 [ 2478.249082] ? avc_policy_seqno+0x9/0x70 [ 2478.249551] ? selinux_file_permission+0x92/0x520 [ 2478.250174] vfs_write+0x7c0/0xb10 [ 2478.250591] ksys_write+0x12d/0x260 [ 2478.251089] ? __ia32_sys_read+0xb0/0xb0 [ 2478.251560] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2478.252214] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2478.252814] do_syscall_64+0x33/0x40 [ 2478.253278] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2478.253879] RIP: 0033:0x7f0068470b19 [ 2478.254326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2478.256454] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2478.257335] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2478.258157] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2478.258968] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2478.259791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2478.260602] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2478.270497] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:55:01 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', 0x0, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) [ 2478.359070] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=36406 comm=syz-executor.0 10:55:01 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007cb) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 19) [ 2478.408098] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=36535 comm=syz-executor.7 [ 2478.415667] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:55:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x105) r2 = socket$netlink(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x20, 0x3c, 0x0, 0x70bd25, 0x25dfdbfe, {0x11}, [@nested={0xc, 0x89, 0x0, 0x1, [@typed={0x8, 0x8c, 0x0, 0x0, @uid=0xffffffffffffffff}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008000}, 0xc040) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r4 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xd, 0x80010, r1, 0x147ec000) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) openat(r5, &(0x7f0000000100)='./file0\x00', 0x400040, 0x4) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2478.468079] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2478.470733] FAULT_INJECTION: forcing a failure. [ 2478.470733] name failslab, interval 1, probability 0, space 0, times 0 [ 2478.472113] CPU: 1 PID: 36573 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2478.472911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2478.473866] Call Trace: [ 2478.474176] dump_stack+0x107/0x167 [ 2478.474570] should_fail.cold+0x5/0xa [ 2478.475001] ? create_object.isra.0+0x3a/0xa30 [ 2478.475531] should_failslab+0x5/0x20 [ 2478.475957] kmem_cache_alloc+0x5b/0x310 [ 2478.476437] create_object.isra.0+0x3a/0xa30 [ 2478.476926] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2478.477515] kmem_cache_alloc+0x159/0x310 [ 2478.478000] jbd2__journal_start+0x190/0x7e0 [ 2478.478507] __ext4_journal_start_sb+0x214/0x390 [ 2478.479048] ext4_da_write_begin+0x51f/0xd40 [ 2478.479551] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2478.480167] ? ext4_write_begin+0x10f0/0x10f0 [ 2478.480680] ? copyout_mc+0x140/0x140 [ 2478.481105] ? current_time+0x2bf/0x2c0 [ 2478.481569] generic_perform_write+0x20a/0x4f0 [ 2478.482103] ? page_cache_prev_miss+0x310/0x310 [ 2478.482648] ? down_write_killable+0x180/0x180 [ 2478.483213] ext4_buffered_write_iter+0x232/0x4a0 [ 2478.483772] ext4_file_write_iter+0xccd/0x1530 [ 2478.484290] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2478.484828] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2478.485458] new_sync_write+0x42c/0x660 [ 2478.485924] ? new_sync_read+0x6f0/0x6f0 [ 2478.486391] ? ksys_write+0x12d/0x260 [ 2478.486825] ? lock_release+0x680/0x680 [ 2478.487288] ? avc_policy_seqno+0x9/0x70 [ 2478.487749] ? selinux_file_permission+0x92/0x520 [ 2478.488318] vfs_write+0x7c0/0xb10 [ 2478.488729] ksys_write+0x12d/0x260 [ 2478.489188] ? __ia32_sys_read+0xb0/0xb0 [ 2478.489663] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2478.490262] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2478.490825] do_syscall_64+0x33/0x40 [ 2478.491256] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2478.491850] RIP: 0033:0x7f0068470b19 [ 2478.492266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2478.494394] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2478.495277] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2478.496106] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2478.496943] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2478.497758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2478.498592] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2478.506041] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=60 sclass=netlink_xfrm_socket pid=36604 comm=syz-executor.6 10:55:01 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007e0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000100), 0xffffffff00000001, 0x10000) fcntl$getflags(r4, 0x1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:55:01 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007cd) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:01 executing program 6: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007d6) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x36a001, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000001c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)={0xff}) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x30, r2, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c000000010000002bbd7000000000000200000006005700270000002ade02098b2d5a0bf2e6245237bea67b94052598ee62ce2e0fa52b93a0fbb24ca44936f9a18eebf53ffcfb41cf3b7a74f6f09a84cf1819e6e3b29d91433538d083f185bdd51d7543b15a335a4cf24e767da21b43c5296e3892a1055f18df9e88b1c1d6c04cc5e0bfa778c2e83415557d64e92875c36a929d848bf832a8ec0dbb475303a278de698c06bd1267057c854bfacaac278914ad4089895408d74813e1b5e1c0c7e2f5d59f03c296c573360c297f57dd1d998543f68455a1d2e8bd77991b2e9ecfde38dda96afffcd2f045abf2c07e3e33c0a208cd69"], 0x1c}}, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000080)={0x0, 0x0}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES16=r4, @ANYRES16=r5, @ANYRESOCT=r0, @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYRES16=r3], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2478.660028] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=36734 comm=syz-executor.0 10:55:17 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:55:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 20) 10:55:17 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007cf) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:17 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007e4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20b, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x5}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x20008080) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)={0x4}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f00000006c0)=@keyring) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x28000, 0x110) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0x13, 0x4) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, 0x0, 0x5, 0x0, 0x80, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf256821804970f67e73503d697387b3dd1d0000000800030098eb6d65b942060aefb0cd213ca71206bb7eb4964a09d3ec98ee859ea0ee0e8f82f192fee68ca4543debbd4d28a45ae8aa20d615d12df4cf8d2f433fb5cae82c6e44728b5d328b0d1f9627fa3243aad625ea973b80ffa184f663a7c719b64b6ea9202e17b0a1", @ANYRES32=r6, @ANYBLOB="2200c70040040101a90520067f000802800700070202400102054a2696349ce9bc8f00002200c70081018104040606010807090740070305ac031f000402c480c8d5d49568110000"], 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x20004050) lseek(r0, 0x0, 0x3) 10:55:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe4014f736d16a0055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d2d2036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a42d3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1387b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="ff0f00e408a84e27124efeee923e39bcfd00000000002e2f66696c653000"]) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:55:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x1, {0x5c6, {0x20, 0x1, 0x2}, 0x50, r2, 0xee01, 0x100000000, 0x1ff, 0x4, 0x3, 0x4, 0x6, 0x1, 0x8, 0x4, 0x0, 0xfffffffffffffff7, 0x10000, 0x20, 0x3f, 0x7ff}}, 0xa0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) lstat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000004c0)) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r5 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r5, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:55:17 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', 0x0, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) [ 2494.045898] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2494.060283] FAULT_INJECTION: forcing a failure. [ 2494.060283] name failslab, interval 1, probability 0, space 0, times 0 [ 2494.062963] CPU: 1 PID: 36762 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2494.064446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2494.066209] Call Trace: [ 2494.066777] dump_stack+0x107/0x167 [ 2494.067566] should_fail.cold+0x5/0xa [ 2494.068382] ? jbd2__journal_start+0x190/0x7e0 [ 2494.069358] should_failslab+0x5/0x20 [ 2494.070166] kmem_cache_alloc+0x5b/0x310 [ 2494.071033] jbd2__journal_start+0x190/0x7e0 [ 2494.071981] __ext4_journal_start_sb+0x214/0x390 [ 2494.073245] ext4_da_write_begin+0x51f/0xd40 [ 2494.074188] ? ext4_write_begin+0x10f0/0x10f0 [ 2494.075139] ? copyout_mc+0x140/0x140 [ 2494.075966] ? ext4_dirty_inode+0x107/0x130 [ 2494.076884] ? __mark_inode_dirty+0x12e/0xd40 [ 2494.077837] generic_perform_write+0x20a/0x4f0 [ 2494.078814] ? page_cache_prev_miss+0x310/0x310 [ 2494.079818] ? down_write_killable+0x180/0x180 [ 2494.080804] ext4_buffered_write_iter+0x232/0x4a0 [ 2494.081840] ext4_file_write_iter+0xccd/0x1530 [ 2494.082824] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2494.083819] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2494.084945] new_sync_write+0x42c/0x660 [ 2494.085798] ? new_sync_read+0x6f0/0x6f0 [ 2494.086664] ? ksys_write+0x12d/0x260 [ 2494.087487] ? lock_release+0x680/0x680 [ 2494.088334] ? avc_policy_seqno+0x9/0x70 [ 2494.089192] ? selinux_file_permission+0x92/0x520 [ 2494.090231] vfs_write+0x7c0/0xb10 [ 2494.090992] ksys_write+0x12d/0x260 [ 2494.091859] ? __ia32_sys_read+0xb0/0xb0 [ 2494.092742] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2494.093863] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2494.094970] do_syscall_64+0x33/0x40 [ 2494.095778] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2494.096863] RIP: 0033:0x7f0068470b19 [ 2494.097656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2494.101645] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2494.103344] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2494.104881] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2494.106406] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2494.107918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2494.109433] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:55:17 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007d1) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:17 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007ec) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2494.142607] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=36755 comm=syz-executor.7 [ 2494.160821] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=37013 comm=syz-executor.0 [ 2494.216213] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=37067 comm=syz-executor.7 [ 2494.222468] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2494.232789] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=36755 comm=syz-executor.7 [ 2494.250879] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=37067 comm=syz-executor.7 10:55:17 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:55:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000100)={0x400, 0x8b, 0x6, 0x8, 0x4}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:55:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 21) 10:55:17 executing program 6: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', 0x0, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:55:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x32003, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2494.340356] FAULT_INJECTION: forcing a failure. [ 2494.340356] name failslab, interval 1, probability 0, space 0, times 0 [ 2494.342242] CPU: 0 PID: 37259 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2494.343079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2494.344092] Call Trace: [ 2494.344415] dump_stack+0x107/0x167 [ 2494.344855] should_fail.cold+0x5/0xa [ 2494.345334] ? __es_insert_extent+0xed1/0x1370 [ 2494.345890] should_failslab+0x5/0x20 [ 2494.346386] kmem_cache_alloc+0x5b/0x310 [ 2494.346885] __es_insert_extent+0xed1/0x1370 [ 2494.347443] ? do_raw_read_unlock+0x70/0x70 [ 2494.347972] ext4_es_insert_delayed_block+0x30d/0x6d0 [ 2494.348600] ? ext4_is_pending+0x210/0x210 [ 2494.349121] ? do_raw_spin_lock+0x121/0x260 [ 2494.349643] ? ext4_has_free_clusters+0x294/0x570 [ 2494.350238] ? percpu_counter_add_batch+0x8b/0x140 [ 2494.350845] ? do_raw_spin_unlock+0x4f/0x220 [ 2494.351388] ? _raw_spin_unlock+0x1a/0x30 [ 2494.351902] ? ext4_da_reserve_space+0xf8/0x3c0 [ 2494.352482] ext4_da_get_block_prep+0xa91/0x1100 [ 2494.353054] ? ext4_da_release_space+0x480/0x480 [ 2494.353636] ? lock_downgrade+0x6d0/0x6d0 [ 2494.354137] ? create_empty_buffers+0x4a3/0x640 [ 2494.354726] ? do_raw_spin_unlock+0x4f/0x220 [ 2494.355277] ? create_page_buffers+0x139/0x230 [ 2494.355830] __block_write_begin_int+0x3d1/0x19c0 [ 2494.356421] ? ext4_da_release_space+0x480/0x480 [ 2494.357028] ? remove_inode_buffers+0x300/0x300 [ 2494.357592] ? jbd2__journal_start+0xf3/0x7e0 [ 2494.358154] ext4_da_write_begin+0x37d/0xd40 [ 2494.358700] ? ext4_write_begin+0x10f0/0x10f0 [ 2494.359219] ? copyout_mc+0x140/0x140 [ 2494.359682] ? current_time+0x2bf/0x2c0 [ 2494.360144] generic_perform_write+0x20a/0x4f0 [ 2494.360696] ? page_cache_prev_miss+0x310/0x310 [ 2494.361249] ? down_write_killable+0x180/0x180 [ 2494.361802] ext4_buffered_write_iter+0x232/0x4a0 [ 2494.362380] ext4_file_write_iter+0xccd/0x1530 [ 2494.362938] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2494.363509] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2494.364149] new_sync_write+0x42c/0x660 [ 2494.364641] ? new_sync_read+0x6f0/0x6f0 [ 2494.365143] ? ksys_write+0x12d/0x260 [ 2494.365610] ? lock_release+0x680/0x680 [ 2494.366084] ? avc_policy_seqno+0x9/0x70 [ 2494.366577] ? selinux_file_permission+0x92/0x520 [ 2494.367169] vfs_write+0x7c0/0xb10 [ 2494.367608] ksys_write+0x12d/0x260 [ 2494.368048] ? __ia32_sys_read+0xb0/0xb0 [ 2494.368536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2494.369127] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2494.369742] do_syscall_64+0x33/0x40 [ 2494.370198] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2494.370798] RIP: 0033:0x7f0068470b19 [ 2494.371256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2494.373396] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2494.374308] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2494.375174] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2494.376013] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2494.376879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2494.377691] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:55:17 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007f3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2494.419628] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=37308 comm=syz-executor.0 [ 2494.448309] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2494.517216] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=37393 comm=syz-executor.7 [ 2494.539501] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:55:32 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:55:32 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:55:32 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007f5) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:32 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007d3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 22) 10:55:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, r0, 0x0) lseek(r0, 0x0, 0x3) 10:55:32 executing program 6: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007d2) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:32 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x1af301, 0x0) sendmsg$nl_generic(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000600)={0x2b0, 0x1f, 0xb4cd4593da0eee0a, 0x70bd2a, 0x25dfdbfe, {0x1e}, [@typed={0x8, 0x31, 0x0, 0x0, @uid}, @generic="a6439525ef8e47247b73270aed40c76bfdcc5237b68691551435", @nested={0x276, 0x48, 0x0, 0x1, [@generic="c26910c485582e1a6f942eac7f803592f3edbe691b139600d400d53e0493260f412e39f611c9efb680355a12ce532d9a0eb92383f8f7557681248d26ec2179addc8763e422ed7a43f800d50d938ca549efc2f16934c879f7770a9b27658c7794d83728c1b8ac5929470300df0bc1740fecbec59395e97a96517922f63955d8a188e3f461cb0fa8e757e52ff6ddffc55a897b21d9f6b50c14f392aad0c80f", @typed={0x22, 0x1b, 0x0, 0x0, @str='builtin_and_secondary_trusted\x00'}, @generic="8e5ffbe17b5425253bd4df974a12ecf851bc894e420b0c3e5bcb2c03dbd1078811835d2cfc938d38db5b3f1b17f527228ca84ef5e64652063b3d47267980c5ce42a2f62f659832d0c351a6c097839321778b219b4c258077e12e2e46e2c9564629567144d4a74f5ec376d4f644e91a36a39d282270637b047089d7746a15ef47703eceb0d3aa19b409f4aba542d2ff2cf3f646738507d2983cd3a879d88ad2de491e87a62065fa1a053d580d37532cf59f27624c9d80a0518b3ce8891b8866be9a56920f2907ddd6", @typed={0x8, 0x52, 0x0, 0x0, @ipv4=@remote}, @generic="83db8a9d4eb9fdab3fbea3bcb752efbd2ac2c3c8886163dd5dde3470fd28870ccf178ab13e6d8470b1384add344ad56ba78a9a76ef7e9afe24e9b84ffbcaf128c2901c58d21ee54e2f852879f06caca483247c19115f217f1744df91088f659d3c126cca13fb63cfef26060424a40b5241e79f1d8421e4fc848d6e0cd212dcf7aad18ad9772a4afa6c56a9097e370d67d856", @generic="8cb6c21fc1bd936b1fac07e497eccf804322a2a8c9d3960383a9fd50fef11aaeaa1437ff86f32c47d224a14abb16a30f2437e37a889b87bb7e0ae9b85ec09a81f2eb7c0c8797", @typed={0x8, 0x47, 0x0, 0x0, @fd=r3}]}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x40800}, 0x84) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x14, 0x0, 0xfffffffffffffffc, r4, 0x0) keyctl$link(0x8, r4, 0xfffffffffffffffb) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2509.171272] FAULT_INJECTION: forcing a failure. [ 2509.171272] name failslab, interval 1, probability 0, space 0, times 0 [ 2509.176761] CPU: 0 PID: 37497 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2509.178574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2509.180747] Call Trace: [ 2509.181451] dump_stack+0x107/0x167 [ 2509.182436] should_fail.cold+0x5/0xa [ 2509.183372] ? create_object.isra.0+0x3a/0xa30 [ 2509.184333] should_failslab+0x5/0x20 [ 2509.185140] kmem_cache_alloc+0x5b/0x310 [ 2509.186070] create_object.isra.0+0x3a/0xa30 [ 2509.187001] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2509.188093] kmem_cache_alloc+0x159/0x310 [ 2509.188987] alloc_buffer_head+0x20/0x110 [ 2509.189888] alloc_page_buffers+0x14d/0x700 [ 2509.190797] create_empty_buffers+0x2c/0x640 [ 2509.191736] ? start_this_handle+0xfdd/0x1390 [ 2509.192682] ? start_this_handle+0xd57/0x1390 [ 2509.193676] create_page_buffers+0x1bb/0x230 [ 2509.194597] __block_write_begin_int+0x1d1/0x19c0 [ 2509.195625] ? ext4_da_release_space+0x480/0x480 [ 2509.196606] ? kmem_cache_alloc+0x2a6/0x310 [ 2509.197507] ? remove_inode_buffers+0x300/0x300 [ 2509.198491] ? jbd2__journal_start+0xf3/0x7e0 [ 2509.199464] ext4_da_write_begin+0x37d/0xd40 [ 2509.200398] ? ext4_write_begin+0x10f0/0x10f0 [ 2509.201323] ? copyout_mc+0x140/0x140 [ 2509.202123] ? ext4_dirty_inode+0x107/0x130 [ 2509.203032] ? __mark_inode_dirty+0x12e/0xd40 [ 2509.204005] generic_perform_write+0x20a/0x4f0 [ 2509.205053] ? page_cache_prev_miss+0x310/0x310 [ 2509.206157] ? down_write_killable+0x180/0x180 [ 2509.207130] ext4_buffered_write_iter+0x232/0x4a0 [ 2509.208160] ext4_file_write_iter+0xccd/0x1530 [ 2509.209127] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2509.210093] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2509.211199] new_sync_write+0x42c/0x660 [ 2509.212041] ? new_sync_read+0x6f0/0x6f0 [ 2509.212890] ? ksys_write+0x12d/0x260 [ 2509.213670] ? lock_release+0x680/0x680 [ 2509.214500] ? avc_policy_seqno+0x9/0x70 [ 2509.215369] ? selinux_file_permission+0x92/0x520 [ 2509.216405] vfs_write+0x7c0/0xb10 [ 2509.217154] ksys_write+0x12d/0x260 [ 2509.217927] ? __ia32_sys_read+0xb0/0xb0 [ 2509.218775] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2509.219872] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2509.220941] do_syscall_64+0x33/0x40 [ 2509.221720] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2509.222803] RIP: 0033:0x7f0068470b19 [ 2509.223590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2509.227448] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2509.229059] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2509.230539] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2509.232069] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2509.233565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2509.235092] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2509.269976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=37524 comm=syz-executor.7 10:55:32 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007f8) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2509.288046] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:55:32 executing program 6: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) [ 2509.308527] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=37657 comm=syz-executor.7 10:55:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 23) [ 2509.322750] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=37621 comm=syz-executor.0 [ 2509.351093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=37524 comm=syz-executor.7 [ 2509.354594] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2509.415728] FAULT_INJECTION: forcing a failure. [ 2509.415728] name failslab, interval 1, probability 0, space 0, times 0 [ 2509.418619] CPU: 1 PID: 37905 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2509.420078] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2509.421837] Call Trace: [ 2509.422397] dump_stack+0x107/0x167 [ 2509.423165] should_fail.cold+0x5/0xa [ 2509.423986] ? __es_insert_extent+0xed1/0x1370 [ 2509.424956] should_failslab+0x5/0x20 [ 2509.425756] kmem_cache_alloc+0x5b/0x310 [ 2509.426619] __es_insert_extent+0xed1/0x1370 [ 2509.427558] ? do_raw_read_unlock+0x70/0x70 [ 2509.428486] ext4_es_insert_delayed_block+0x30d/0x6d0 [ 2509.429582] ? ext4_is_pending+0x210/0x210 [ 2509.430466] ? do_raw_spin_lock+0x121/0x260 [ 2509.431393] ? ext4_has_free_clusters+0x294/0x570 [ 2509.432407] ? percpu_counter_add_batch+0x8b/0x140 [ 2509.433457] ? do_raw_spin_unlock+0x4f/0x220 [ 2509.434394] ? _raw_spin_unlock+0x1a/0x30 [ 2509.435275] ? ext4_da_reserve_space+0xf8/0x3c0 [ 2509.436277] ext4_da_get_block_prep+0xa91/0x1100 [ 2509.437272] ? ext4_da_release_space+0x480/0x480 [ 2509.438264] ? lock_downgrade+0x6d0/0x6d0 [ 2509.439153] ? create_empty_buffers+0x4a3/0x640 [ 2509.440134] ? do_raw_spin_unlock+0x4f/0x220 [ 2509.441054] ? create_page_buffers+0x139/0x230 [ 2509.442010] __block_write_begin_int+0x3d1/0x19c0 [ 2509.443031] ? ext4_da_release_space+0x480/0x480 [ 2509.444110] ? remove_inode_buffers+0x300/0x300 [ 2509.445092] ? jbd2__journal_start+0xf3/0x7e0 [ 2509.446063] ext4_da_write_begin+0x37d/0xd40 [ 2509.446999] ? ext4_write_begin+0x10f0/0x10f0 [ 2509.447940] ? copyout_mc+0x140/0x140 [ 2509.448735] ? current_time+0x2bf/0x2c0 [ 2509.449584] generic_perform_write+0x20a/0x4f0 [ 2509.450566] ? page_cache_prev_miss+0x310/0x310 [ 2509.451552] ? down_write_killable+0x180/0x180 [ 2509.452525] ext4_buffered_write_iter+0x232/0x4a0 [ 2509.453537] ext4_file_write_iter+0xccd/0x1530 [ 2509.454506] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2509.455489] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2509.456618] new_sync_write+0x42c/0x660 [ 2509.457462] ? new_sync_read+0x6f0/0x6f0 [ 2509.458306] ? ksys_write+0x12d/0x260 [ 2509.459113] ? lock_release+0x680/0x680 [ 2509.459960] ? avc_policy_seqno+0x9/0x70 [ 2509.460816] ? selinux_file_permission+0x92/0x520 [ 2509.461850] vfs_write+0x7c0/0xb10 [ 2509.462615] ksys_write+0x12d/0x260 [ 2509.463382] ? __ia32_sys_read+0xb0/0xb0 [ 2509.464239] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2509.465340] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2509.466437] do_syscall_64+0x33/0x40 [ 2509.467224] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2509.468320] RIP: 0033:0x7f0068470b19 [ 2509.469109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2509.472987] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2509.474586] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2509.476093] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2509.477613] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2509.479100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2509.480595] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:55:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000080)={0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r7, 0x4b67, &(0x7f0000000080)={0x0, 0x0}) write$binfmt_elf64(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYRES32=r6, @ANYRESDEC=r4], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:55:32 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2509.719684] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=38023 comm=syz-executor.0 [ 2527.430956] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:55:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x70bd25, 0x25dfdbfe, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) r3 = syz_open_dev$mouse(&(0x7f0000000e00), 0x81, 0x40) sendmsg$nl_generic(r3, &(0x7f0000001200)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000011c0)={&(0x7f0000000e80)={0x32c, 0x1d, 0x800, 0x70bd2b, 0x25dfdbfe, {0x3}, [@typed={0x4, 0x4d}, @generic="ddd459ee835a3d0364e10fca6b911b7ffbaa1693b40aa43767153a7678f9de96e77cf94bd42dafb6038d23211040f29aed", @generic="ac8bac358921c26116fd10f543257e4eb57effddc6e08640371ab3cac2dd5971bff1f7a3d4bef45b00cee494fc93c57871449c3bbd9e3a0e4046d3e4cbc5802b0919ae1f53f81499398f0d558716a78a3b03abe4c65e660d6536f53a96b4f68f20c8844b8807dbbb54bf1bef557ecb9f8c518fb89f48448f247d4fddc701af4ea80dea4e198a051a6dbe932701e66ee4c6d7ca998f44ac2f1edc137e1ac05ed8484331cf77e47549b11c25d51558a5a241c0775e4c38b5fa8a5ab7905aaf", @generic="eb8fb81aa90fc28b70ccb56371fe3a5bfe6703afd5a967746bef908cf2dc06baa22adaa92a848e4d4544cd96c58f2fdd9d6bafcd48b8392a23845818996fa337b7dbfb9ce8d3aa9b4cf3", @typed={0xc, 0x76, 0x0, 0x0, @u64}, @typed={0x14, 0x50, 0x0, 0x0, @ipv6=@private2}, @generic="07df8f649f1fc6e3f34a430970d84c606db6ecebe5836271aa3b4186afc4b26335108bed2d15c1d2b356b4e1aa87c1fb0469596e5466e5d8303984c181bf799d3492c6c200cb378dcfd26b83cdbb3c1b17b7deb9d82fd0e913f79d7253bee2ab564beb3d336dff1d17ca02b0d21733095395c54b3888f3845207385d89fdc9b60135e8367385c3f98c7ee5713ecd18ed7e3b137632c5129307c5ddef4711499bb44b5e6f9518f0bf39cb2b4f6c89e7ee86a97fb4f239cedb8ddda80a16d35f7b19a0", @generic="5a3b80e66b2bcadb35afd3983a3e9ce7423ff7330990822dc7390c7e35609b0e9f25f4d1bbe8ea770f8f3712af4876ae1cb02f584642ce54934c489a744ee791ed85d29a74799436714f8dd74255075d7db5ae60ec9517361f8e50ee91d7fc2cd81e502d55f9ee125cfa3c85f871a1ea3e0b05f832a46a5faa6587db8aaa91880731a7b58aaa43b379634d5c29eec691e55f3420944addc76af7fab952c61f00ab139cae9422a68b02dd35a36be424cc40c28734be543db37dfbf968baa22b812ec28939499759260d4952beddf03cf68e751978581d72c2cd86b836c2cb37f381a3d994b61486fd325f6225b966cc2e283ff1a5a8af"]}, 0x32c}}, 0x2) 10:55:50 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, r4) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:55:50 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007d5) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:50 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007fd) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:55:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) (fail_nth: 1) 10:55:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 24) 10:55:50 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) [ 2527.437574] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:55:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x0, 0x0}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000080)={0x0, 0x0}) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000002c0), 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) clone3(&(0x7f0000000500)={0x8000, &(0x7f00000000c0)=0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180), {0xf}, &(0x7f0000000200)=""/113, 0x71, &(0x7f0000000400)=""/220, &(0x7f00000002c0)}, 0x58) close(r5) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r6 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYBLOB="ff0ffaffffe5f03cd9df097558f11dff00002e2a666956653000"]) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2527.451816] FAULT_INJECTION: forcing a failure. [ 2527.451816] name failslab, interval 1, probability 0, space 0, times 0 [ 2527.454523] CPU: 1 PID: 38143 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2527.455993] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2527.457793] Call Trace: [ 2527.458356] dump_stack+0x107/0x167 [ 2527.459133] should_fail.cold+0x5/0xa [ 2527.459947] ? create_object.isra.0+0x3a/0xa30 [ 2527.460905] should_failslab+0x5/0x20 [ 2527.461703] kmem_cache_alloc+0x5b/0x310 [ 2527.462567] create_object.isra.0+0x3a/0xa30 [ 2527.463505] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2527.464577] kmem_cache_alloc+0x159/0x310 [ 2527.465460] __es_insert_extent+0xed1/0x1370 [ 2527.466385] ? do_raw_read_unlock+0x70/0x70 [ 2527.467308] ext4_es_insert_delayed_block+0x30d/0x6d0 [ 2527.468409] ? ext4_is_pending+0x210/0x210 [ 2527.469296] ? do_raw_spin_lock+0x121/0x260 [ 2527.470207] ? ext4_has_free_clusters+0x294/0x570 [ 2527.471223] ? percpu_counter_add_batch+0x8b/0x140 [ 2527.472274] ? do_raw_spin_unlock+0x4f/0x220 [ 2527.473198] ? _raw_spin_unlock+0x1a/0x30 [ 2527.474077] ? ext4_da_reserve_space+0xf8/0x3c0 [ 2527.475064] ext4_da_get_block_prep+0xa91/0x1100 [ 2527.476117] ? ext4_da_release_space+0x480/0x480 [ 2527.477114] ? lock_downgrade+0x6d0/0x6d0 [ 2527.477997] ? create_empty_buffers+0x4a3/0x640 [ 2527.478973] ? do_raw_spin_unlock+0x4f/0x220 [ 2527.479913] ? create_page_buffers+0x139/0x230 [ 2527.480879] __block_write_begin_int+0x3d1/0x19c0 [ 2527.481904] ? ext4_da_release_space+0x480/0x480 [ 2527.482912] ? remove_inode_buffers+0x300/0x300 [ 2527.483905] ? jbd2__journal_start+0xf3/0x7e0 [ 2527.484866] ext4_da_write_begin+0x37d/0xd40 [ 2527.485805] ? ext4_write_begin+0x10f0/0x10f0 [ 2527.486746] ? copyout_mc+0x140/0x140 [ 2527.487550] ? ext4_dirty_inode+0x107/0x130 [ 2527.488460] ? __mark_inode_dirty+0x12e/0xd40 [ 2527.489413] generic_perform_write+0x20a/0x4f0 [ 2527.490389] ? page_cache_prev_miss+0x310/0x310 [ 2527.491367] ? down_write_killable+0x180/0x180 [ 2527.492384] ext4_buffered_write_iter+0x232/0x4a0 [ 2527.493410] ext4_file_write_iter+0xccd/0x1530 [ 2527.494385] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2527.495358] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2527.496477] new_sync_write+0x42c/0x660 [ 2527.497315] ? new_sync_read+0x6f0/0x6f0 [ 2527.498179] ? ksys_write+0x12d/0x260 [ 2527.498985] ? lock_release+0x680/0x680 [ 2527.499832] ? avc_policy_seqno+0x9/0x70 [ 2527.500682] ? selinux_file_permission+0x92/0x520 [ 2527.501713] vfs_write+0x7c0/0xb10 [ 2527.502478] ksys_write+0x12d/0x260 [ 2527.503245] ? __ia32_sys_read+0xb0/0xb0 [ 2527.504125] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2527.505230] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2527.506319] do_syscall_64+0x33/0x40 [ 2527.507102] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2527.508184] RIP: 0033:0x7f0068470b19 [ 2527.508969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2527.512850] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2527.514452] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2527.515952] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2527.517449] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2527.518960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2527.520466] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:55:50 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007d9) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2527.633918] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=38142 comm=syz-executor.7 [ 2527.644600] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2527.674783] FAULT_INJECTION: forcing a failure. [ 2527.674783] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2527.677553] CPU: 0 PID: 38253 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2527.679094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2527.680879] Call Trace: [ 2527.681447] dump_stack+0x107/0x167 [ 2527.682220] should_fail.cold+0x5/0xa [ 2527.683031] _copy_to_user+0x2e/0x180 [ 2527.683850] simple_read_from_buffer+0xcc/0x160 [ 2527.684837] proc_fail_nth_read+0x198/0x230 [ 2527.685749] ? proc_sessionid_read+0x230/0x230 [ 2527.686721] ? proc_sessionid_read+0x230/0x230 [ 2527.687691] vfs_read+0x228/0x620 [ 2527.688435] ksys_read+0x12d/0x260 [ 2527.689189] ? vfs_write+0xb10/0xb10 [ 2527.689982] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2527.691089] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2527.692181] do_syscall_64+0x33/0x40 [ 2527.692967] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2527.694046] RIP: 0033:0x7fb58c26469c [ 2527.694829] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2527.698720] RSP: 002b:00007fb589806170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2527.700328] RAX: ffffffffffffffda RBX: 0000000001000000 RCX: 00007fb58c26469c [ 2527.701836] RDX: 000000000000000f RSI: 00007fb5898061e0 RDI: 0000000000000009 [ 2527.703350] RBP: 00007fb5898061d0 R08: 0000000000000000 R09: 0000000000000000 [ 2527.704859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2527.706361] R13: 00007ffcc9b00e3f R14: 00007fb589806300 R15: 0000000000022000 10:56:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:56:07 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000802) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:07 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007db) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:07 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', 0x0) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r4) 10:56:07 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:56:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:56:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 25) 10:56:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000002c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "2a877c4bb6903ea1c84e07e8a3dddb3bdf607d1ce9f7e2202de3dddf422e8dea8565405fe1db65d5fbda2140db4c4bbcf64374b97ab7c586a9d9e6be5c911e07", 0x20}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000200)={0x0, "9db472bab2ef89aca4854aaa0a2d936aa1f33a4d210249cefe1cc213fc2281a3cdc9791a8b7a8643b5e80b4202af817e3179336d0c65360314b7d86ceb219e80", 0x3f}, 0x48, r4) lseek(r0, 0x0, 0x3) [ 2543.928762] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2543.937924] FAULT_INJECTION: forcing a failure. [ 2543.937924] name failslab, interval 1, probability 0, space 0, times 0 [ 2543.940650] CPU: 1 PID: 38575 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2543.942208] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2543.944090] Call Trace: [ 2543.944689] dump_stack+0x107/0x167 [ 2543.945512] should_fail.cold+0x5/0xa [ 2543.946373] ? create_object.isra.0+0x3a/0xa30 [ 2543.947402] should_failslab+0x5/0x20 [ 2543.948281] kmem_cache_alloc+0x5b/0x310 [ 2543.949214] create_object.isra.0+0x3a/0xa30 [ 2543.950202] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2543.951347] kmem_cache_alloc+0x159/0x310 [ 2543.952339] __es_insert_extent+0xed1/0x1370 [ 2543.953336] ? do_raw_read_unlock+0x70/0x70 [ 2543.954398] ext4_es_insert_delayed_block+0x30d/0x6d0 [ 2543.955567] ? ext4_is_pending+0x210/0x210 [ 2543.956530] ? do_raw_spin_lock+0x121/0x260 [ 2543.957512] ? ext4_has_free_clusters+0x294/0x570 [ 2543.958338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=38577 comm=syz-executor.0 [ 2543.958595] ? percpu_counter_add_batch+0x8b/0x140 [ 2543.961479] ? do_raw_spin_unlock+0x4f/0x220 [ 2543.962472] ? _raw_spin_unlock+0x1a/0x30 [ 2543.963442] ? ext4_da_reserve_space+0xf8/0x3c0 [ 2543.964507] ext4_da_get_block_prep+0xa91/0x1100 [ 2543.965577] ? ext4_da_release_space+0x480/0x480 [ 2543.966640] ? lock_downgrade+0x6d0/0x6d0 [ 2543.967593] ? create_empty_buffers+0x4a3/0x640 [ 2543.968761] ? do_raw_spin_unlock+0x4f/0x220 [ 2543.969753] ? create_page_buffers+0x139/0x230 [ 2543.970775] __block_write_begin_int+0x3d1/0x19c0 [ 2543.971873] ? ext4_da_release_space+0x480/0x480 [ 2543.972951] ? remove_inode_buffers+0x300/0x300 [ 2543.974013] ? jbd2__journal_start+0xf3/0x7e0 [ 2543.975039] ext4_da_write_begin+0x37d/0xd40 [ 2543.976071] ? ext4_write_begin+0x10f0/0x10f0 [ 2543.977092] ? copyout_mc+0x140/0x140 [ 2543.977959] ? ext4_dirty_inode+0x107/0x130 [ 2543.978945] ? __mark_inode_dirty+0x12e/0xd40 [ 2543.979979] generic_perform_write+0x20a/0x4f0 [ 2543.981036] ? page_cache_prev_miss+0x310/0x310 [ 2543.982101] ? down_write_killable+0x180/0x180 [ 2543.983162] ext4_buffered_write_iter+0x232/0x4a0 [ 2543.984273] ext4_file_write_iter+0xccd/0x1530 [ 2543.985333] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2543.986385] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2543.987593] new_sync_write+0x42c/0x660 [ 2543.988515] ? new_sync_read+0x6f0/0x6f0 [ 2543.989442] ? ksys_write+0x12d/0x260 [ 2543.990316] ? lock_release+0x680/0x680 [ 2543.991224] ? avc_policy_seqno+0x9/0x70 [ 2543.992166] ? selinux_file_permission+0x92/0x520 [ 2543.993286] vfs_write+0x7c0/0xb10 [ 2543.994108] ksys_write+0x12d/0x260 [ 2543.994945] ? __ia32_sys_read+0xb0/0xb0 [ 2543.995888] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2543.997082] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2543.998268] do_syscall_64+0x33/0x40 [ 2543.999119] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2544.000303] RIP: 0033:0x7f0068470b19 [ 2544.001151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2544.005386] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2544.007123] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2544.008754] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2544.010379] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2544.012015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2544.013642] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:56:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000100)={0x2, 0xc3e, 0x6, 0x80000000, 0x2, [{0x9, 0x1, 0x3, '\x00', 0x800}, {0x2, 0x5, 0x40, '\x00', 0xa00}]}) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) [ 2544.078083] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:56:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 26) [ 2544.131985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=38871 comm=syz-executor.0 10:56:07 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2544.162579] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=38700 comm=syz-executor.7 [ 2544.183785] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2544.200131] FAULT_INJECTION: forcing a failure. [ 2544.200131] name failslab, interval 1, probability 0, space 0, times 0 [ 2544.201761] CPU: 0 PID: 38941 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2544.202655] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2544.203726] Call Trace: [ 2544.204072] dump_stack+0x107/0x167 [ 2544.204544] should_fail.cold+0x5/0xa [ 2544.205036] ? create_object.isra.0+0x3a/0xa30 [ 2544.205633] should_failslab+0x5/0x20 [ 2544.206133] kmem_cache_alloc+0x5b/0x310 [ 2544.206659] create_object.isra.0+0x3a/0xa30 [ 2544.207293] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2544.207974] kmem_cache_alloc+0x159/0x310 [ 2544.208517] __es_insert_extent+0xed1/0x1370 [ 2544.209093] ? do_raw_read_unlock+0x70/0x70 [ 2544.209663] ext4_es_insert_delayed_block+0x30d/0x6d0 [ 2544.210346] ? ext4_is_pending+0x210/0x210 [ 2544.210889] ? do_raw_spin_lock+0x121/0x260 [ 2544.211470] ? ext4_has_free_clusters+0x294/0x570 [ 2544.212138] ? percpu_counter_add_batch+0x8b/0x140 [ 2544.212798] ? do_raw_spin_unlock+0x4f/0x220 [ 2544.213385] ? _raw_spin_unlock+0x1a/0x30 [ 2544.213937] ? ext4_da_reserve_space+0xf8/0x3c0 [ 2544.214561] ext4_da_get_block_prep+0xa91/0x1100 [ 2544.215197] ? ext4_da_release_space+0x480/0x480 [ 2544.215837] ? lock_downgrade+0x6d0/0x6d0 [ 2544.216399] ? create_empty_buffers+0x4a3/0x640 [ 2544.217013] ? do_raw_spin_unlock+0x4f/0x220 [ 2544.217598] ? create_page_buffers+0x139/0x230 [ 2544.218206] __block_write_begin_int+0x3d1/0x19c0 [ 2544.218844] ? ext4_da_release_space+0x480/0x480 [ 2544.219480] ? remove_inode_buffers+0x300/0x300 [ 2544.220101] ? jbd2__journal_start+0xf3/0x7e0 [ 2544.220700] ext4_da_write_begin+0x37d/0xd40 [ 2544.221286] ? ext4_write_begin+0x10f0/0x10f0 [ 2544.221878] ? copyout_mc+0x140/0x140 [ 2544.222379] ? ext4_dirty_inode+0x107/0x130 [ 2544.222949] ? __mark_inode_dirty+0x12e/0xd40 [ 2544.223546] generic_perform_write+0x20a/0x4f0 [ 2544.224169] ? page_cache_prev_miss+0x310/0x310 [ 2544.224782] ? down_write_killable+0x180/0x180 [ 2544.225392] ext4_buffered_write_iter+0x232/0x4a0 [ 2544.226030] ext4_file_write_iter+0xccd/0x1530 [ 2544.226643] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2544.227255] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2544.227958] new_sync_write+0x42c/0x660 [ 2544.228509] ? new_sync_read+0x6f0/0x6f0 [ 2544.229047] ? ksys_write+0x12d/0x260 [ 2544.229551] ? lock_release+0x680/0x680 [ 2544.230080] ? avc_policy_seqno+0x9/0x70 [ 2544.230610] ? selinux_file_permission+0x92/0x520 [ 2544.231252] vfs_write+0x7c0/0xb10 [ 2544.231731] ksys_write+0x12d/0x260 [ 2544.232205] ? __ia32_sys_read+0xb0/0xb0 [ 2544.232740] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2544.233432] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2544.234109] do_syscall_64+0x33/0x40 [ 2544.234597] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2544.235268] RIP: 0033:0x7f0068470b19 [ 2544.235758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2544.238159] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2544.239158] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2544.240095] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2544.241022] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2544.241954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2544.242882] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:56:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="ff0f0000f2ffffff2e2f66696c653000"]) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:56:07 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000809) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:07 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007dd) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="ff0f0040000020002e2f66696c653000"]) io_uring_enter(r2, 0x3415, 0x8cea, 0x3, &(0x7f0000000080)={[0x1]}, 0x8) r3 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:56:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x3, 0x3) [ 2544.374755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=39050 comm=syz-executor.0 10:56:07 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', 0x0) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r4) [ 2544.409665] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2544.442303] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:56:07 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000810) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 27) [ 2544.508046] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=39208 comm=syz-executor.6 [ 2544.519097] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:56:07 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007df) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2544.547931] FAULT_INJECTION: forcing a failure. [ 2544.547931] name failslab, interval 1, probability 0, space 0, times 0 [ 2544.550688] CPU: 1 PID: 39256 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2544.552163] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2544.553924] Call Trace: [ 2544.554482] dump_stack+0x107/0x167 [ 2544.555250] should_fail.cold+0x5/0xa [ 2544.556068] ? create_object.isra.0+0x3a/0xa30 [ 2544.557032] should_failslab+0x5/0x20 [ 2544.557836] kmem_cache_alloc+0x5b/0x310 [ 2544.558704] create_object.isra.0+0x3a/0xa30 [ 2544.559634] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2544.560722] kmem_cache_alloc+0x159/0x310 [ 2544.561605] __es_insert_extent+0xed1/0x1370 [ 2544.562539] ? do_raw_read_unlock+0x70/0x70 [ 2544.563462] ext4_es_insert_delayed_block+0x30d/0x6d0 [ 2544.564560] ? ext4_is_pending+0x210/0x210 [ 2544.565454] ? do_raw_spin_lock+0x121/0x260 [ 2544.566370] ? ext4_has_free_clusters+0x294/0x570 [ 2544.567393] ? percpu_counter_add_batch+0x8b/0x140 [ 2544.568445] ? do_raw_spin_unlock+0x4f/0x220 [ 2544.569381] ? _raw_spin_unlock+0x1a/0x30 [ 2544.570322] ? ext4_da_reserve_space+0xf8/0x3c0 [ 2544.571354] ext4_da_get_block_prep+0xa91/0x1100 [ 2544.572413] ? ext4_da_release_space+0x480/0x480 [ 2544.573416] ? lock_downgrade+0x6d0/0x6d0 [ 2544.574296] ? create_empty_buffers+0x4a3/0x640 [ 2544.575273] ? do_raw_spin_unlock+0x4f/0x220 [ 2544.576214] ? create_page_buffers+0x139/0x230 [ 2544.577177] __block_write_begin_int+0x3d1/0x19c0 [ 2544.578192] ? ext4_da_release_space+0x480/0x480 [ 2544.579215] ? remove_inode_buffers+0x300/0x300 [ 2544.580194] ? jbd2__journal_start+0xf3/0x7e0 [ 2544.581168] ext4_da_write_begin+0x37d/0xd40 [ 2544.582115] ? ext4_write_begin+0x10f0/0x10f0 [ 2544.583066] ? copyout_mc+0x140/0x140 [ 2544.583889] ? ext4_dirty_inode+0x107/0x130 [ 2544.584808] ? __mark_inode_dirty+0x12e/0xd40 [ 2544.585770] generic_perform_write+0x20a/0x4f0 [ 2544.586760] ? page_cache_prev_miss+0x310/0x310 [ 2544.587763] ? ext4_generic_write_checks+0x11e/0x310 [ 2544.588854] ext4_buffered_write_iter+0x232/0x4a0 [ 2544.589886] ext4_file_write_iter+0xccd/0x1530 [ 2544.590873] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2544.591861] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2544.592989] new_sync_write+0x42c/0x660 [ 2544.593835] ? new_sync_read+0x6f0/0x6f0 [ 2544.594701] ? ksys_write+0x12d/0x260 [ 2544.595451] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=39308 comm=syz-executor.7 [ 2544.595514] ? lock_release+0x680/0x680 [ 2544.597762] ? avc_policy_seqno+0x9/0x70 [ 2544.598629] ? selinux_file_permission+0x92/0x520 [ 2544.599682] vfs_write+0x7c0/0xb10 [ 2544.600444] ksys_write+0x12d/0x260 [ 2544.601218] ? __ia32_sys_read+0xb0/0xb0 [ 2544.602086] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2544.603198] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2544.604307] do_syscall_64+0x33/0x40 [ 2544.605100] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2544.606190] RIP: 0033:0x7f0068470b19 [ 2544.606979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2544.610964] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2544.612595] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2544.614113] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2544.615644] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2544.617168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2544.618697] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:56:23 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:56:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 28) 10:56:23 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007e3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x4, 0x3) 10:56:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r2, 0x8008f513, &(0x7f0000000200)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x18, r5, 0xb0b, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0x12c, r5, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_STRINGSETS={0xec, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x9}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x20000000}, 0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x4248, 0x0, 0x0, 0x9, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:56:23 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000812) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:23 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', 0x0) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r4) 10:56:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000080), 0xf, 0x20) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}}, 0x1) lseek(r0, 0x0, 0x3) [ 2560.143456] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2560.147555] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2560.151443] FAULT_INJECTION: forcing a failure. [ 2560.151443] name failslab, interval 1, probability 0, space 0, times 0 [ 2560.154762] CPU: 0 PID: 39430 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2560.156317] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2560.158347] Call Trace: [ 2560.158939] dump_stack+0x107/0x167 [ 2560.159779] should_fail.cold+0x5/0xa [ 2560.160635] ? ext4_init_io_end+0x23/0x180 [ 2560.161579] should_failslab+0x5/0x20 [ 2560.162429] kmem_cache_alloc+0x5b/0x310 [ 2560.163345] ext4_init_io_end+0x23/0x180 [ 2560.164257] ext4_writepages+0x8ec/0x3350 [ 2560.165204] ? mark_held_locks+0x9e/0xe0 [ 2560.166135] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2560.167494] ? quarantine_put+0x8b/0x1a0 [ 2560.168537] ? trace_hardirqs_on+0x5b/0x180 [ 2560.169655] ? __ext4_mark_inode_dirty+0x770/0x770 [ 2560.170910] ? __kasan_slab_free+0x122/0x160 [ 2560.172070] ? jbd2_journal_stop+0x61f/0xdc0 [ 2560.173204] ? jbd2_journal_stop+0x188/0xdc0 [ 2560.174362] ? balance_dirty_pages_ratelimited+0x43e/0x2000 [ 2560.175830] ? __ext4_journal_stop+0x107/0x1f0 [ 2560.177038] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2560.178303] ? __mark_inode_dirty+0x12e/0xd40 [ 2560.179477] ? __ext4_mark_inode_dirty+0x770/0x770 [ 2560.180753] do_writepages+0xee/0x2a0 [ 2560.181749] ? page_writeback_cpu_online+0x20/0x20 [ 2560.183012] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 2560.184314] ? lock_downgrade+0x6d0/0x6d0 [ 2560.185389] ? generic_perform_write+0x37d/0x4f0 [ 2560.186609] __filemap_fdatawrite_range+0x24b/0x2f0 [ 2560.187901] ? delete_from_page_cache_batch+0xa30/0xa30 [ 2560.189358] filemap_write_and_wait_range+0x65/0x100 [ 2560.190669] ext4_file_write_iter+0xd45/0x1530 [ 2560.191869] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2560.193046] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2560.194399] new_sync_write+0x42c/0x660 [ 2560.195428] ? new_sync_read+0x6f0/0x6f0 [ 2560.196484] ? ksys_write+0x12d/0x260 [ 2560.197461] ? lock_release+0x680/0x680 [ 2560.198462] ? avc_policy_seqno+0x9/0x70 [ 2560.199498] ? selinux_file_permission+0x92/0x520 [ 2560.200749] vfs_write+0x7c0/0xb10 [ 2560.201706] ksys_write+0x12d/0x260 [ 2560.202636] ? __ia32_sys_read+0xb0/0xb0 [ 2560.203663] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2560.204996] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2560.206349] do_syscall_64+0x33/0x40 [ 2560.207299] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2560.208604] RIP: 0033:0x7f0068470b19 [ 2560.209523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2560.214105] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2560.216004] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2560.217786] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2560.219567] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2560.221352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2560.223126] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:56:23 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007eb) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2560.265932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=39670 comm=syz-executor.7 [ 2560.280915] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2560.284825] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=39697 comm=syz-executor.0 [ 2560.322913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=39483 comm=syz-executor.6 10:56:23 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000817) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:23 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2560.353139] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:56:43 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:56:43 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:56:43 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007f2) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:43 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x8000081e) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x6, 0x3) 10:56:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:56:43 executing program 0: ftruncate(0xffffffffffffffff, 0x1000003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r1, 0x9e46, 0x0) r2 = dup2(r1, r0) getdents64(r1, &(0x7f0000001400)=""/53, 0x35) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x5, 0x0, r1, &(0x7f0000000000)={0x40002001}, r2}, 0x81) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x0, 0x0, r3, &(0x7f0000000040)={0x2009}, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x7fff) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r6 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYBLOB="f40f000000c80000002e2f66696c673000"]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 10:56:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 29) [ 2579.822484] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2579.831712] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2579.878964] FAULT_INJECTION: forcing a failure. [ 2579.878964] name failslab, interval 1, probability 0, space 0, times 0 [ 2579.880863] CPU: 1 PID: 39877 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2579.881864] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2579.883043] Call Trace: [ 2579.883428] dump_stack+0x107/0x167 [ 2579.883958] should_fail.cold+0x5/0xa [ 2579.884500] ? create_object.isra.0+0x3a/0xa30 [ 2579.885154] should_failslab+0x5/0x20 [ 2579.885705] kmem_cache_alloc+0x5b/0x310 [ 2579.886289] create_object.isra.0+0x3a/0xa30 [ 2579.886916] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2579.887658] kmem_cache_alloc+0x159/0x310 [ 2579.888270] ext4_init_io_end+0x23/0x180 [ 2579.888844] ext4_writepages+0xee9/0x3350 [ 2579.889460] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2579.890204] ? quarantine_put+0x8b/0x1a0 [ 2579.890782] ? trace_hardirqs_on+0x5b/0x180 [ 2579.891399] ? __ext4_mark_inode_dirty+0x770/0x770 [ 2579.892103] ? __kasan_slab_free+0x122/0x160 [ 2579.892737] ? jbd2_journal_stop+0x61f/0xdc0 [ 2579.893387] ? jbd2_journal_stop+0x188/0xdc0 [ 2579.894015] ? balance_dirty_pages_ratelimited+0x43e/0x2000 [ 2579.894827] ? __ext4_journal_stop+0x107/0x1f0 [ 2579.895489] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2579.896193] ? __mark_inode_dirty+0x12e/0xd40 [ 2579.896843] ? __ext4_mark_inode_dirty+0x770/0x770 [ 2579.897534] do_writepages+0xee/0x2a0 [ 2579.898081] ? page_writeback_cpu_online+0x20/0x20 [ 2579.898784] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 2579.899489] ? lock_downgrade+0x6d0/0x6d0 [ 2579.900147] ? generic_perform_write+0x37d/0x4f0 [ 2579.900821] __filemap_fdatawrite_range+0x24b/0x2f0 [ 2579.901088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=39903 comm=syz-executor.6 [ 2579.901529] ? delete_from_page_cache_batch+0xa30/0xa30 [ 2579.904870] filemap_write_and_wait_range+0x65/0x100 [ 2579.905209] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2579.905606] ext4_file_write_iter+0xd45/0x1530 [ 2579.905630] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2579.908735] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2579.909480] new_sync_write+0x42c/0x660 [ 2579.910038] ? new_sync_read+0x6f0/0x6f0 [ 2579.910607] ? ksys_write+0x12d/0x260 [ 2579.911150] ? lock_release+0x680/0x680 [ 2579.911709] ? avc_policy_seqno+0x9/0x70 [ 2579.912287] ? selinux_file_permission+0x92/0x520 [ 2579.912974] vfs_write+0x7c0/0xb10 [ 2579.913489] ksys_write+0x12d/0x260 [ 2579.914001] ? __ia32_sys_read+0xb0/0xb0 [ 2579.914574] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2579.915313] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2579.916044] do_syscall_64+0x33/0x40 [ 2579.916569] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2579.917287] RIP: 0033:0x7f0068470b19 [ 2579.917819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2579.920888] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2579.922807] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2579.924563] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2579.926067] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2579.927560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2579.929063] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 10:56:43 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2580.022919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=40134 comm=syz-executor.7 [ 2580.036961] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:56:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000400)="643da7432a31c39bd788b44f0a3820fdde499460f7450d4465b966ad3b63ebdb9c6870fd4c66aee89e442195b1e19e5dfee26a0964f728976426181aa1a5a3a03d7da45cd6e82d00662e4abf83eb78f4eefebf91c72634ff950e9d07022587614addae03cd5bab291f51ebed0b333d866ce056cf62c5d168cd9bb7bf7392cc0cca1d95822d86f98b2080475458cc1f319f2f92f97952364eddd664af82b4d4308b708677c40d63b9de19c9bf90b7a6dd0df51813ae4c7fbc497919b496b50a18ea13", 0xc2, r3) r4 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:56:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 30) 10:56:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xb, 0x3) 10:56:43 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) 10:56:43 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007f4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:43 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000820) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2580.150850] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:56:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) [ 2580.173037] FAULT_INJECTION: forcing a failure. [ 2580.173037] name failslab, interval 1, probability 0, space 0, times 0 [ 2580.175680] CPU: 0 PID: 40195 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2580.177141] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2580.178877] Call Trace: [ 2580.179430] dump_stack+0x107/0x167 [ 2580.180199] should_fail.cold+0x5/0xa [ 2580.181006] ? jbd2__journal_start+0x190/0x7e0 [ 2580.181959] should_failslab+0x5/0x20 [ 2580.182760] kmem_cache_alloc+0x5b/0x310 [ 2580.183621] jbd2__journal_start+0x190/0x7e0 [ 2580.184562] __ext4_journal_start_sb+0x214/0x390 [ 2580.185568] ext4_writepages+0x102d/0x3350 [ 2580.186493] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2580.187596] ? quarantine_put+0x8b/0x1a0 [ 2580.188561] ? trace_hardirqs_on+0x5b/0x180 [ 2580.189470] ? __ext4_mark_inode_dirty+0x770/0x770 [ 2580.190508] ? __kasan_slab_free+0x122/0x160 [ 2580.191430] ? jbd2_journal_stop+0x61f/0xdc0 [ 2580.192361] ? jbd2_journal_stop+0x188/0xdc0 [ 2580.193290] ? balance_dirty_pages_ratelimited+0x43e/0x2000 [ 2580.194501] ? __ext4_journal_stop+0x107/0x1f0 [ 2580.195483] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2580.196543] ? __mark_inode_dirty+0x12e/0xd40 [ 2580.197521] ? __ext4_mark_inode_dirty+0x770/0x770 [ 2580.198574] do_writepages+0xee/0x2a0 [ 2580.199404] ? page_writeback_cpu_online+0x20/0x20 [ 2580.200469] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 2580.201535] ? lock_downgrade+0x6d0/0x6d0 [ 2580.202411] ? generic_perform_write+0x37d/0x4f0 [ 2580.203427] __filemap_fdatawrite_range+0x24b/0x2f0 [ 2580.204501] ? delete_from_page_cache_batch+0xa30/0xa30 [ 2580.205657] filemap_write_and_wait_range+0x65/0x100 [ 2580.206750] ext4_file_write_iter+0xd45/0x1530 [ 2580.207743] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2580.208737] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2580.209878] new_sync_write+0x42c/0x660 [ 2580.210729] ? new_sync_read+0x6f0/0x6f0 [ 2580.211603] ? ksys_write+0x12d/0x260 [ 2580.212433] ? lock_release+0x680/0x680 [ 2580.213287] ? avc_policy_seqno+0x9/0x70 [ 2580.214160] ? selinux_file_permission+0x92/0x520 [ 2580.215211] vfs_write+0x7c0/0xb10 [ 2580.215989] ksys_write+0x12d/0x260 [ 2580.216772] ? __ia32_sys_read+0xb0/0xb0 [ 2580.217646] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2580.218767] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2580.219879] do_syscall_64+0x33/0x40 [ 2580.220687] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2580.221793] RIP: 0033:0x7f0068470b19 [ 2580.222636] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2580.226602] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2580.228241] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2580.229775] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2580.231318] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2580.232851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2580.234380] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2580.236153] EXT4-fs (sda): ext4_writepages: jbd2_start: 9223372036854775807 pages, ino 16109; err -12 [ 2580.239499] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2580.271637] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=40234 comm=syz-executor.0 10:56:43 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) [ 2580.329877] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=40221 comm=syz-executor.6 10:56:43 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007f7) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2580.338370] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2580.394692] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=40271 comm=syz-executor.7 10:56:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xc, 0x3) [ 2580.416912] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:56:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) syz_io_uring_setup(0x583a, &(0x7f0000000100)={0x0, 0x26a, 0x20, 0x1, 0xb7, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000200)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_READ=@pass_buffer={0x16, 0x5, 0x2000, @fd_index=0x2, 0x6, &(0x7f0000000400)=""/175, 0xaf, 0x1}, 0x80000001) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="28000092ae001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e4aab1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa7"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)={0xff}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000004c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_INTERFACE(r3, &(0x7f0000000600)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000540)={&(0x7f0000000640)=ANY=[@ANYBLOB="2800000066ead2215299aa63d71881d4e3ce920a013ca45dbe9aae2030c335b9e63e82dc1e7221afc171810cafb4458c9b9c955589634ff8e1e731ad0921f8f96528ba80dab9ea4aad9024344c3cdfde30359115ba4c6e86b4943f6816df762272a580e346cae745127ffbd4a444c351b7aa73379af4724799d802ad047aa208d70206a2", @ANYRES16=0x0, @ANYBLOB="00042abd7000fedbdf250500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000100000051000000"], 0x28}, 0x1, 0x0, 0x0, 0x44}, 0x0) memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x32c10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0xd7c8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) fspick(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) [ 2580.480545] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2580.510582] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=40478 comm=syz-executor.0 10:56:43 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000822) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:56:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfff}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f7d617ead86a1c5d479dfdd7d9442c582d4797f794316b55442af48696d10658a8c6b8b34df83075f0984fc56c9882b3c5f5596d571c6b181a8852393ffb4150e6295c60668f92e7a35e4e313762da446ff6c57b689684d9ba03d65122dc62812fdac851aa076f1fa1c763da122fc9b598a114b109845417e7ed7c03857207e37c5fca3ee54da6f903bc6bb39e69cbdb1a127365d4c7c8b8ac1a42ea4e6e76e8509b9cb217b8d9584ca352f5b928e79a9c07629bde685d5a1d0ed6b993ca550e23681d525d2316f923e4e25e3a5e16bd4b2d3de35fd877035c7c9673fdcc8bd53ced8149cd3c06726ef7a7240ca3d7232e7e4dcaab8f9b5287b0"]}]}, 0x120}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MPATH(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r4, 0x800, 0x70bd29, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xc827, 0x7e}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x20040054) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:56:43 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007fc) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2580.586302] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=40518 comm=syz-executor.6 [ 2580.605326] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2580.696040] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=40567 comm=syz-executor.7 10:57:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 31) 10:57:02 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000827) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:57:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000100)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = dup(r4) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000080)={@local, 0x78, r7}) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x0, r7}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6gre0\x00', r7, 0x4, 0x7f, 0x20, 0x6, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, 0x8, 0x7800, 0x8, 0x9}}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r8, 0x0, 0x3) 10:57:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x80, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee01}}, {@uname={'uname', 0x3d, '\x00'}}, {@afid={'afid', 0x3d, 0x401}}], [{@dont_appraise}, {@dont_appraise}]}}) ftruncate(r0, 0x1000003) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000001440)={0x1520, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2851be71}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2a}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x34}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xa}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x2}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2}], @NL80211_ATTR_CSA_IES={0x11e8, 0xb9, 0x0, 0x1, [@beacon_params=[@NL80211_ATTR_BEACON_HEAD={0x327, 0xe, {@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1}, {0x2b}, @broadcast, @broadcast, @random="b04207c817ce", {0x9, 0x5}}, 0x8, @random=0x8a3, 0x40, @val={0x0, 0x6, @default_ibss_ssid}, @void, @void, @void, @val={0x6, 0x2, 0x800}, @void, @void, @val={0x2a, 0x1, {0x1, 0x1}}, @val={0x3c, 0x4, {0x1, 0x81, 0xa, 0x6}}, @void, @void, @val={0x71, 0x7, {0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x97, 0x9}}, @val={0x76, 0x6, {0x2e, 0x97, 0x24}}, [{0xdd, 0x26, "367b1b7c62e7640997d4d43777ba0772ac7e67606e32bd191e5488d677e713c174356fea21af"}, {0xdd, 0xbb, "2c672be90385786ded50cc54f8227432443af8bc98f2ef52016cec375692ca973705cfeef51e5f53b69dafe23a0e75fa2da509c7f0494c2f60a99552627b1740f272b0ba88c7a11dfb9e41660cd4fd2cf016e194ca0deb05c6203d2a012cf2343a61e3ac4082c0b08728fcf7f226282644a176cfc06120994a296135246fc588aa0ec0cb4271d761d07310150c061882ee80a3939df02e6e842c92eab94ecdc3ba45c8598ecb3318ecb5346412c30216270ec384b6cd16f036e263"}, {0xdd, 0xdb, "1abec04781dbdb21e08369e5531f5312bf74a840afe2209ef55027fa44dd6b54094b35bb590ce32a96137a4bed3c33758f7dcde9e18e8fbf4b34dd69449cba72b44c430591390847b9affcd06d78327a5d76e0ca32e2539a20f1c29f4a2babcd9f21887b1ff96c27b0cae14b8b0f49955c821723c28fc9d372ea2b07688cc18775d8cfafaad540e4fd9ada878fe46d5d4782b0e3f6f2d0d1fb6f317cbbe66b88b50056d9d86d9db816f12b776244f318fa6b2b76c2ba8df0f22fec620c216bbe96c4d13da1a0caf6b827e80e8ca3c5e54cf0d0ab9d3b78dc4441e7"}, {0xdd, 0xa5, "6b3a150047d865f3331e572908be40c11aaab9ffc53418a30efc3b2e12cf8cbb71b76ac67aa39b71d263a9f010057c6a4b3b1144175593f29baf3b8d5c0c65878255c92daba1eee1a800e640e85d19077bb75f261e9d6c7d10f9b7b723afa93643e2f82ab53de396d57f5695479a294ab14fa58c9f7cdad10ebb9e2ba82899a947b6e7da5670610614301b71258420a03f1780a9ba7801a1ee545e2ce55dad7374522c3057"}, {0xdd, 0x6e, "963b80f1518c759b49dba6c960a62792e90158320ac4a93e37701a73e9dbccfa78483fe9bffdd1b408dfbaf93a4f9671608c0a185e18afb8d7bdb03271fa64b8d9ec44a9cd9c45472fe1b9c469da0592ea172519d07e60ef1edd253e62816526021af940e029a8e9e36966051629"}]}}, @NL80211_ATTR_BEACON_TAIL={0x108, 0xf, [@rann={0x7e, 0x15, {{0x0, 0x33}, 0x18, 0x5, @device_a, 0x6, 0x7, 0x40}}, @gcr_ga={0xbd, 0x6}, @tim={0x5, 0x5, {0x0, 0xa2, 0x0, "d66e"}}, @preq={0x82, 0x25, @not_ext={{}, 0x4, 0x8, 0x4, @device_a, 0x4, "", 0x0, 0x8000, 0x1, [{{0x1}, @broadcast, 0xb1}]}}, @challenge={0x10, 0x1, 0x8a}, @random_vendor={0xdd, 0xa0, "85e5cb8567d978d39ae1e904cffa1938de2a3be1705d5b9628300efe27e9cef1e02fdaa2b15403773ddbb994e6fb3e1cbd2095993a01890a297c82a8014274594802981156ec63ea27f84e3340c755338a2e8b4bd670b1362806cfa5b9887314af4576e7b1ffa05f63ce4c665fd621597335f8fe892bbd9c0f13719969bddfef9609e917114f95ab8adc5ae779096923636e4818fe99256330333e795eafed09"}, @mic={0x8c, 0x10, {0xddf, "8625019566f0", @short="b4f84dde7b8daca3"}}]}, @NL80211_ATTR_PROBE_RESP={0x5a8, 0x91, "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"}, @NL80211_ATTR_PROBE_RESP={0x727, 0x91, "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"}, @NL80211_ATTR_BEACON_TAIL={0xe2, 0xf, [@mesh_config={0x71, 0x7, {0x0, 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0x91b2e23804de5d4c}}, @fast_bss_trans={0x37, 0x88, {0x1, 0x3, "84fc986bda9b2417ed603784fbb8d872", "1dca233bf44a246ea37324c2da23606c59e6337db19d5ca1d8e6f3c6d5e7d1a8", "56faca02011a04d3680e947bc2d342cedf2da26533d572d5aa8265e2eab8912c", [{0x2, 0x9, "f4d54921fa9ce0cb7f"}, {0x4, 0x7, "479898e6a6a4d8"}, {0x1, 0x20, "29e525647657cef19f59900cf8cffd9a3df9e7e91f3a9a5400860d2880478404"}]}}, @prep={0x83, 0x25, @ext={{}, 0x7, 0x9, @broadcast, 0x200, @broadcast, 0x1, 0x7, @device_a, 0x80000000}}, @dsss={0x3, 0x1, 0x30}, @ext_channel_switch={0x3c, 0x4, {0x1, 0x6, 0x78, 0x65}}, @measure_req={0x26, 0x19, {0x8, 0x5, 0x1, "673ce8664cb90f3a3da613a5fbcd13b7da0bf17fbd4a"}}]}]]}, @NL80211_ATTR_CSA_IES={0x298, 0xb9, 0x0, 0x1, [@beacon_params=[@NL80211_ATTR_BEACON_TAIL={0x107, 0xf, [@random={0xff, 0xcb, "856c0274c5c4a9c9b70a98090d844ba47181c4a249e2fca9593092349d0a235eaa65dc7cb2d5c7aca8bfbdd6a412047e5a105e15e00cba88a5192b5e47f14ab406faa2114a2d10ece9555c37eb3fb1146299d41130915adf0873bf6d6ccc9a12102114c86c1489143b0b3b33124ec2099df47b4fce75c38e0bd53cada20256a1fd4aa52364655672a487ebe4bf55a19b864d9162b2988d1ce2a4116d7125774e361f6c6434a5d6b8db951715db025a14d9c44fad09b1a9fa4907a49d0f897b339b5e666b97304a690e185a"}, @sec_chan_ofs={0x3e, 0x1, 0x1}, @tim={0x5, 0x28, {0x1, 0x9f, 0x9, "3441c8d00627b2ab3647739fa5fce1cb91263dcc7ba78477bc700150f7dc641a242320a222"}}, @random_vendor={0xdd, 0x7, "e4a35243266874"}]}, @NL80211_ATTR_IE={0x19, 0x2a, [@mesh_id={0x72, 0x6}, @supported_rates={0x1, 0x6, [{0x36, 0x1}, {0x2}, {0x3}, {0x1b, 0x1}, {0x1b, 0x1}, {0x10, 0x1}]}, @channel_switch={0x25, 0x3, {0x0, 0xe, 0x7f}}]}, @NL80211_ATTR_IE={0x4f, 0x2a, [@ibss={0x6, 0x2, 0x8000}, @ht={0x2d, 0x1a, {0x10, 0x2, 0x7, 0x0, {0x5, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1}, 0x700, 0x1, 0x7}}, @link_id={0x65, 0x12, {@random="631cba9801bf", @device_a, @broadcast}}, @mesh_id={0x72, 0x6}, @mesh_config={0x71, 0x7, {0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x29}}, @chsw_timing={0x68, 0x4, {0xd766, 0xfff}}]}, @NL80211_ATTR_BEACON_TAIL={0x11d, 0xf, [@fast_bss_trans={0x37, 0xd3, {0x4, 0x4, "bf9d30c3fd3542d1539e9a354e480d20", "1fa99b5a4877355c7109a1f7a06fec34e2034fe69481dab5b4b0df82878ea9b4", "fc0a190c8293536a7bc4716503e6b16273e85d30e3ceb4921ad74da57abee3b2", [{0x3, 0x1e, "139f92da41c1e2701fffc193a389ecf8274c1f6b1dd9340b7849a20c3f58"}, {0x2, 0x1d, "49a530592cd3d1c7408de882b30e8573f4a0e9946237160f43ef79a48f"}, {0x3, 0x1d, "5bdf7e731f34d3cf8a4a98f3b88893c5c408bb52b1f3662439de16ebe5"}, {0x2, 0x21, "99c04c0068849e2cdf721f63e6079a7b35ca0d4207319aaa71c2ea584384cb2339"}]}}, @rann={0x7e, 0x15, {{0x1, 0x7c}, 0x4, 0x1, @broadcast, 0x3, 0x1, 0x10000}}, @gcr_ga={0xbd, 0x6, @device_b}, @dsss={0x3, 0x1, 0x9}, @mic={0x8c, 0x18, {0xfb0, "03a671c827b5", @long="23a9ef020517cb10c612b854b6983058"}}, @ssid={0x0, 0x6, @default_ap_ssid}]}]]}, @NL80211_ATTR_CSA_IES={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x142}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x27}, @NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}]}, 0x1520}, 0x1, 0x0, 0x0, 0x20008010}, 0x20004084) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)=ANY=[@ANYBLOB="fb", @ANYRES32, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 10:57:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="280000001d00210c00003f87000000000000000014000100fc0207000000000000000000009e669aef8a4f1e09b8adcbe2490116c56dc1b6325032217c5a32097e6d9c7eba7d48b1353691bbeb3471d8e5be5efb67307c5194d4d5619ffb4d19a9890ed576fe40144cf7206ef055dcc8d9b9185fa9c356b775e49eb1fe0cc015689d717330e9d45e55133631f4908db43601f0bf6863d288036fa492db184e098119a891595b444e7850986fd7b4216aa4c4992a4cb2fe2a2bd3a0488ecb5c2b48a5086b9f77fdd8daf04812db3f5090f142a5a771022ca7f016b4d218591d6658937bdc1386b0050aa78345"], 0x28}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@secondary) r3 = memfd_create(&(0x7f0000000080)='builtin_and_secondary_trusted\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x120, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="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"]}]}, 0x120}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000c80)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x10, 0x3) 10:57:02 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x800007fe) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:57:02 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:57:02 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2599.565827] FAULT_INJECTION: forcing a failure. [ 2599.565827] name failslab, interval 1, probability 0, space 0, times 0 [ 2599.569625] CPU: 0 PID: 40637 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2599.571521] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2599.573922] Call Trace: [ 2599.573954] dump_stack+0x107/0x167 [ 2599.573982] should_fail.cold+0x5/0xa [ 2599.574008] ? create_object.isra.0+0x3a/0xa30 [ 2599.574031] should_failslab+0x5/0x20 [ 2599.574054] kmem_cache_alloc+0x5b/0x310 [ 2599.574086] create_object.isra.0+0x3a/0xa30 [ 2599.574106] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2599.574138] kmem_cache_alloc+0x159/0x310 [ 2599.574170] jbd2__journal_start+0x190/0x7e0 [ 2599.574200] __ext4_journal_start_sb+0x214/0x390 [ 2599.574231] ext4_writepages+0x102d/0x3350 [ 2599.574299] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2599.587002] ? quarantine_put+0x8b/0x1a0 [ 2599.587019] ? trace_hardirqs_on+0x5b/0x180 [ 2599.587043] ? __ext4_mark_inode_dirty+0x770/0x770 [ 2599.587133] ? __kasan_slab_free+0x122/0x160 [ 2599.587163] ? jbd2_journal_stop+0x61f/0xdc0 [ 2599.592081] ? jbd2_journal_stop+0x188/0xdc0 [ 2599.592104] ? balance_dirty_pages_ratelimited+0x43e/0x2000 [ 2599.592132] ? __ext4_journal_stop+0x107/0x1f0 [ 2599.592157] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2599.592176] ? __mark_inode_dirty+0x12e/0xd40 [ 2599.592213] ? __ext4_mark_inode_dirty+0x770/0x770 [ 2599.597751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=40650 comm=syz-executor.7 [ 2599.598648] do_writepages+0xee/0x2a0 [ 2599.598676] ? page_writeback_cpu_online+0x20/0x20 [ 2599.598703] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 2599.604136] ? lock_downgrade+0x6d0/0x6d0 [ 2599.605095] ? generic_perform_write+0x37d/0x4f0 [ 2599.606197] __filemap_fdatawrite_range+0x24b/0x2f0 [ 2599.607337] ? delete_from_page_cache_batch+0xa30/0xa30 [ 2599.608603] filemap_write_and_wait_range+0x65/0x100 [ 2599.609757] ext4_file_write_iter+0xd45/0x1530 [ 2599.610828] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2599.611885] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2599.613143] new_sync_write+0x42c/0x660 [ 2599.614052] ? new_sync_read+0x6f0/0x6f0 [ 2599.614979] ? ksys_write+0x12d/0x260 [ 2599.615851] ? lock_release+0x680/0x680 [ 2599.616765] ? avc_policy_seqno+0x9/0x70 [ 2599.617746] ? selinux_file_permission+0x92/0x520 [ 2599.618859] vfs_write+0x7c0/0xb10 [ 2599.619685] ksys_write+0x12d/0x260 [ 2599.620514] ? __ia32_sys_read+0xb0/0xb0 [ 2599.621438] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2599.622620] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2599.623783] do_syscall_64+0x33/0x40 [ 2599.624630] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2599.625767] RIP: 0033:0x7f0068470b19 [ 2599.626610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2599.630730] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2599.632456] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2599.634070] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2599.635672] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2599.637261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2599.638837] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 [ 2599.656281] __nla_validate_parse: 2 callbacks suppressed [ 2599.656292] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. 10:57:03 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000801) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2599.700275] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. 10:57:03 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000829) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 10:57:03 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000808) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8d, 0x6}}, './file0\x00'}) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0xc0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 2599.819153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=40647 comm=syz-executor.0 10:57:03 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) [ 2599.889490] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2599.913240] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=40649 comm=syz-executor.6 10:57:03 executing program 5: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) r4 = request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', r4) request_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f00000003c0)='(,\',\\)&@\x00', r5) 10:57:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x7392c0, 0x0) ioctl$SG_IO(r2, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x5, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6bb, 0x0, 0x3, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x1, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x20, 0x7, 0x9}}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000007c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00100000000000002e2f66696c653000545cd5c72791f74d7b042d159d6087d4289ed5c52d8e8162a345b15f1fa4093c130100000000000000e85726fa4716ac904bca49534ca61294f6197387e0387dab7f9308168f0a9c3f9797a1fbc4e394c6c77814b3d5d3dba54984e7daf969c955019a9525dc6e3d4af5cf6cda70f0933e58a90697ca7ec69a354bf9b3dcc4d191883271ad0900000051a8aee5ee8938430fff24b8a37f1f4074f9fce6fbe3016e3fbb080000000000000000000000002c7c369900a5347557245017bc"]) pidfd_getfd(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000940)={'ip6gre0\x00', r3, 0x29, 0x0, 0x7f, 0xa28, 0xe6afc5b9f1842d2e, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x10, 0x8000, 0x64, 0x9}}) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x3, 0x1, 0x800000, 0x8, 0x7c07c1cd}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xac, 0x14, 0x400, 0x70bd2c, 0x25dfdbfe, {0x20}, [@generic="642b0be02f21f5063ec6f7c29369ed4d78229ecc4dc2c27592abb2cd800800ddaaa24b74fe25ce0e20c0f5903cae01a9e045a71bc7b660407eb0b2ef294e2267dd4908850479ab62205f6e77edbf1734120efdfdc63d9c23ab934643b7f729c2f50e2eafb29e30e58248a6baa6797e2c99f7f28fc8e8d08b9db21555d1082d3ef40f0300dfb0c257214c746a0cca4c735c15aa3bc473871a"]}, 0xac}, 0x1, 0x0, 0x0, 0x20004801}, 0x4080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYRES16=r2], 0xb) (fail_nth: 32) [ 2599.925933] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2599.980105] FAULT_INJECTION: forcing a failure. [ 2599.980105] name failslab, interval 1, probability 0, space 0, times 0 [ 2599.982101] CPU: 1 PID: 41024 Comm: syz-executor.2 Not tainted 5.10.244 #1 [ 2599.983059] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2599.984214] Call Trace: [ 2599.984596] dump_stack+0x107/0x167 [ 2599.985101] should_fail.cold+0x5/0xa [ 2599.985638] ? ext4_alloc_io_end_vec+0x1f/0x120 [ 2599.986283] should_failslab+0x5/0x20 [ 2599.986832] kmem_cache_alloc+0x5b/0x310 [ 2599.987407] ext4_alloc_io_end_vec+0x1f/0x120 [ 2599.988039] ext4_writepages+0x17a5/0x3350 [ 2599.988664] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2599.989392] ? quarantine_put+0x8b/0x1a0 [ 2599.989966] ? trace_hardirqs_on+0x5b/0x180 [ 2599.990589] ? __ext4_mark_inode_dirty+0x770/0x770 [ 2599.991277] ? __kasan_slab_free+0x122/0x160 [ 2599.991908] ? jbd2_journal_stop+0x61f/0xdc0 [ 2599.992533] ? jbd2_journal_stop+0x188/0xdc0 [ 2599.993175] ? balance_dirty_pages_ratelimited+0x43e/0x2000 [ 2599.993984] ? __ext4_journal_stop+0x107/0x1f0 [ 2599.994633] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2599.995327] ? __mark_inode_dirty+0x12e/0xd40 [ 2599.995982] ? __ext4_mark_inode_dirty+0x770/0x770 [ 2599.996676] do_writepages+0xee/0x2a0 [ 2599.997211] ? page_writeback_cpu_online+0x20/0x20 [ 2599.997899] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 2599.998597] ? lock_downgrade+0x6d0/0x6d0 [ 2599.999179] ? generic_perform_write+0x37d/0x4f0 [ 2599.999850] __filemap_fdatawrite_range+0x24b/0x2f0 [ 2600.000568] ? delete_from_page_cache_batch+0xa30/0xa30 [ 2600.001330] filemap_write_and_wait_range+0x65/0x100 [ 2600.002036] ext4_file_write_iter+0xd45/0x1530 [ 2600.002681] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2600.003319] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2600.004049] new_sync_write+0x42c/0x660 [ 2600.004612] ? new_sync_read+0x6f0/0x6f0 [ 2600.005169] ? ksys_write+0x12d/0x260 [ 2600.005694] ? lock_release+0x680/0x680 [ 2600.006258] ? avc_policy_seqno+0x9/0x70 [ 2600.006817] ? selinux_file_permission+0x92/0x520 [ 2600.007496] vfs_write+0x7c0/0xb10 [ 2600.007993] ksys_write+0x12d/0x260 [ 2600.008500] ? __ia32_sys_read+0xb0/0xb0 [ 2600.009076] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2600.009794] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2600.010511] do_syscall_64+0x33/0x40 [ 2600.011020] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2600.011725] RIP: 0033:0x7f0068470b19 [ 2600.012277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2600.014826] RSP: 002b:00007f00659e6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2600.015876] RAX: ffffffffffffffda RBX: 00007f0068583f60 RCX: 00007f0068470b19 [ 2600.016879] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 2600.017870] RBP: 00007f00659e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2600.018864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2600.019867] R13: 00007fff9a739cff R14: 00007f00659e6300 R15: 0000000000022000 VM DIAGNOSIS: 11:02:07 Registers: info registers vcpu 0 RAX=ffffffff83e979f0 RBX=0000000000000000 RCX=ffffffff83e7f65c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e981b8 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85679e08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e979fe RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f4c191bb010 CR3=00000000175f0000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041911205c0000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e979f0 RBX=0000000000000001 RCX=ffffffff83e7f65c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e981b8 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85679e08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e979fe RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb072f77000 CR3=00000000175f0000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00d402fe016c6c6f502e726567616e61 XMM02=000000000000000040f08b8000000000 XMM03=0000060101754db428fc0101039aff0f XMM04=78650d006574616469646e6163206365 XMM05=6578650a00657a696d696e696d206365 XMM06=696820636578650a006873616d732063 XMM07=00736465657320636578650a0073746e XMM08=7a7566206365786509006c61746f7420 XMM09=74616469646e616320636578650e007a XMM10=657a696d696e696d20636578650d0065 XMM11=78650a006873616d7320636578650a00 XMM12=7320636578650a0073746e6968206365 XMM13=7220726f747563657865110073646565 XMM14=65672063657865080073747261747365 XMM15=000065676169727420636578650b006e