fa27082dbd17fb038ef6bb2962f9a823d1708ca4dd249d8a440930f4d87a688046f90f3c2d047ee9901fbc9c9da28510646194b2a14c83490126768b054f7a5a7f18392821b8e500e51401fc54ec509085a070571a448846f49bf08c7eb5b9ccb292f604da1ac7279d20351717e0462dd2a58abd4bb32348d382a10e000000000000000000b711cc343ce4e28f3659f656e2f431c938d96f3f5375cbc038dfba1e13ea15763fd2e6bb69b803e6190c28d830bc5070fa8c7a909d6d90ae8be9a25e5b4418b9503915f7337332cfc671689f05198694bc97149c66c0bafb7543", @ANYRESDEC=r5, @ANYBLOB=',func=PATH_CHECK,smackfsroot=+),,fsmagic=0x0000000000000003,fscontext=unconfined_u,\x00']) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000180)={{r1}, 0x0, 0xa, @unused=[0x7fffffff, 0x7f, 0x6, 0x6a], @devid}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1611.468459] FAULT_INJECTION: forcing a failure. [ 1611.468459] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.470198] CPU: 0 PID: 8992 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1611.471135] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1611.472708] Call Trace: [ 1611.473107] dump_stack+0x107/0x163 [ 1611.473651] should_fail.cold+0x5/0xa [ 1611.474224] ? __list_lru_init+0xcd/0x7e0 [ 1611.474846] should_failslab+0x5/0x10 [ 1611.475407] __kmalloc+0x72/0x3e0 [ 1611.475933] __list_lru_init+0xcd/0x7e0 [ 1611.476525] alloc_super+0x7f4/0x990 [ 1611.477087] sget+0x10b/0x500 [ 1611.477545] ? kill_litter_super+0xa0/0xa0 [ 1611.478176] ? devpts_remount+0x130/0x130 [ 1611.478771] mount_nodev+0x2e/0x120 [ 1611.479287] ? devpts_kill_sb+0x70/0x70 [ 1611.479865] legacy_get_tree+0x105/0x220 [ 1611.480449] ? ns_capable+0xd9/0x100 03:11:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 1611.480966] vfs_get_tree+0x8e/0x2f0 [ 1611.481677] path_mount+0x13ba/0x20a0 [ 1611.482256] ? strncpy_from_user+0x9e/0x460 [ 1611.482880] ? finish_automount+0xa40/0xa40 [ 1611.483514] ? getname_flags.part.0+0x1dd/0x4f0 [ 1611.484219] __x64_sys_mount+0x27e/0x300 [ 1611.484818] ? path_mount+0x20a0/0x20a0 [ 1611.485410] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1611.486187] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.486957] do_syscall_64+0x33/0x40 [ 1611.487507] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1611.488262] RIP: 0033:0x7f9c93414b19 [ 1611.488813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1611.491503] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1611.492613] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1611.493647] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1611.494690] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1611.495726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1611.496771] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:11:10 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) [ 1611.559375] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:11:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x3, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:11:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private=0xffffff9e}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:11:23 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001240)=0x0) r2 = fork() ptrace(0x10, r2) r3 = syz_open_dev$vcsn(&(0x7f0000001340), 0x3, 0x400002) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000001380)={0x8001, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) ptrace(0x11, r2) syz_open_procfs(r2, &(0x7f00000001c0)='net/rt6_stats\x00') clone3(&(0x7f00000012c0)={0x1202c1a00, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0xf}, &(0x7f0000000180)=""/4096, 0x1000, &(0x7f0000001180)=""/130, &(0x7f0000001280)=[r1, r2, r0], 0x3}, 0x58) 03:11:23 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x1000, 0x20, &(0x7f0000ffc000/0x1000)=nil) shmat(r1, &(0x7f0000ffc000/0x3000)=nil, 0x2000) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) r2 = shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) 03:11:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x1ec, 0x3, 0x1, 0x106, 0x0, 0x0, {0x0, 0x0, 0x4}, [@CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x1f}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xfff}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x3}]}, @CTA_PROTOINFO={0x48, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0x44, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0xd0}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x3}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8, 0x2, 0x1, 0x0, 0xf3}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0xdd}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8, 0x3, 0x1, 0x0, 0x3ff}]}}, @CTA_NAT_DST={0xe0, 0xd, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @multicast2}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}, @CTA_NAT_V4_MINIP={0x8, 0x1, @remote}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, @CTA_NAT_PROTO={0x3c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}]}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x44}}, @CTA_NAT_PROTO={0x54, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @private=0xa010100}]}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x3}, @CTA_TUPLE_ORIG={0x68, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @multicast1}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_LABELS={0x24, 0x16, 0x1, 0x0, [0x1d33add0, 0x917c, 0x3, 0x7, 0x8, 0x100, 0x49b, 0x800]}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x8001}, 0x20000000) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$F2FS_IOC_GET_FEATURES(r2, 0x8004f50c, &(0x7f0000000200)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x300, 0xe) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) write$P9_RSTAT(r3, &(0x7f0000000180)={0x4e, 0x7d, 0x2, {0x0, 0x47, 0x8, 0x3, {0x4, 0x0, 0x8}, 0x1800000, 0x0, 0x5, 0x9, 0x8, '~&&{.]%\x93', 0x2, '%$', 0x7, ']:):@:-', 0x3, '|:+'}}, 0x4e) 03:11:23 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 03:11:23 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 26) 03:11:23 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) [ 1624.658753] FAULT_INJECTION: forcing a failure. [ 1624.658753] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.661381] CPU: 1 PID: 9116 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1624.662863] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1624.665305] Call Trace: [ 1624.665888] dump_stack+0x107/0x163 [ 1624.666687] should_fail.cold+0x5/0xa [ 1624.667508] ? __list_lru_init+0xcd/0x7e0 [ 1624.668412] should_failslab+0x5/0x10 [ 1624.669162] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1624.669229] __kmalloc+0x72/0x3e0 [ 1624.671252] __list_lru_init+0xcd/0x7e0 [ 1624.672118] alloc_super+0x7f4/0x990 [ 1624.672923] sget+0x10b/0x500 [ 1624.673594] ? kill_litter_super+0xa0/0xa0 [ 1624.674502] ? devpts_remount+0x130/0x130 [ 1624.675390] mount_nodev+0x2e/0x120 [ 1624.676164] ? devpts_kill_sb+0x70/0x70 [ 1624.677009] legacy_get_tree+0x105/0x220 [ 1624.677874] ? ns_capable+0xd9/0x100 [ 1624.678678] vfs_get_tree+0x8e/0x2f0 [ 1624.679473] path_mount+0x13ba/0x20a0 [ 1624.680289] ? strncpy_from_user+0x9e/0x460 [ 1624.681211] ? finish_automount+0xa40/0xa40 [ 1624.682133] ? getname_flags.part.0+0x1dd/0x4f0 [ 1624.683163] __x64_sys_mount+0x27e/0x300 [ 1624.684031] ? path_mount+0x20a0/0x20a0 [ 1624.684884] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1624.686002] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.687114] do_syscall_64+0x33/0x40 [ 1624.687908] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1624.688999] RIP: 0033:0x7f9c93414b19 [ 1624.689793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1624.693716] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1624.695380] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1624.696899] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1624.698413] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1624.699924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1624.701430] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:11:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:11:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private=0xfffffff0}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 1624.758260] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:11:23 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffffffffff) 03:11:23 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xd1275c7b3d30e514) shmctl$IPC_RMID(0x0, 0x0) 03:11:23 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) 03:11:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private=0xffffffff}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:11:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x5, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:11:23 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 27) 03:11:23 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) [ 1624.873835] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:11:23 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2202, 0x421d35ea8afa3d29) r1 = syz_open_dev$vcsu(&(0x7f00000016c0), 0x827, 0x80001) recvmmsg$unix(r0, &(0x7f0000001d00)=[{{&(0x7f0000001ac0), 0x6e, &(0x7f0000001c40)=[{&(0x7f0000001b40)=""/213, 0xd5}], 0x1, &(0x7f0000001c80)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x68}}], 0x1, 0x2061, &(0x7f0000001d40)={0x0, 0x3938700}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000001d80)={0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e00)={0x0, 0x0, 0x0}, &(0x7f0000001e40)=0xc) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r6, r5, 0x0, 0x9bbb) r7 = getuid() r8 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r8, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r9 = openat2(r0, &(0x7f0000002040)='./file1\x00', &(0x7f0000002080)={0x129200, 0x40, 0x31}, 0x18) sendmsg$unix(r0, &(0x7f00000021c0)={&(0x7f0000000180)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000001540)=[{&(0x7f0000000040)="551a0687089fefa8361373b4881a054a1f4e8fbc841893c3fe927782a48d7a9d68d9f920679c701d9e87553c4b67f5", 0x2f}, {&(0x7f0000000200)="3473189837", 0x5}, {&(0x7f0000000240)="dc0c52abfb5947c09c1b8f712f77f0aac25cc5c2fba80b03c9188d7e1246c40c3ee8f1441f36d5729ca1c7c9b4b3b358e095c93f2e0db0725087474a8d2346cc5f92591c59a3adae17580a92c9b332bed60e4633b158ce2a9d0f66996d7238c24c20d8e46f25ba601a8cde9f1b1fc4753e1a53d6ae9d7b1a612afdb5dd186dc05971ee74d56250ca6ed2cc072b5b36c0832a6f80b11e1727ec9baa65d7f36f889d304b472a2b6ab128f5e30ede243a37602a9691ac3f6c50a2a16f59f56739d9aa0567e55eda4e6f3faf2f7af7c70b9a4de87e377f4aa21aaa38de275a6674de9f15a4db0b356ec460d3f3cfb94247188b888f88", 0xf4}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="c90751dfa1e3412504034ebce4f4bfc971852acf", 0x14}, {&(0x7f0000001380)="2e7f735f644abf30f05a29e2ee0524a04651f78c106309cc8f15a0b3efd40286aafe28fbe6482ca41128c7e209c6820cd57ea60231eaaa17d9270e0ffe2db12c864b86b45353a3156923cd09345f09f0f43825572a16f7f29a66d6d84dbcecbf0c9213359ccac6ca86af513b62206992231398671b6d3cb2056eadb4cf6590b5b791609b303966a53406ce8f90005cf69e8140a830473040487cd7a9f89cae45f83b8424eb0fd6a5ff355832bd", 0xad}, {&(0x7f0000001440)="79547a90d0f6ee6017a36782d76ac64498a1a3c05be2c5e06378c9eddc3df446528b80367040c7a822", 0x29}, {&(0x7f0000001480)="cde07a85c3ef02b3020dc9272cbba19a03534c1f00188acad8cba256c10d23ab298ccd953863ec546df7e78b751098830985ba504b2cb0dbd19241e2b37b04248aeb2eb0cabf99d287ec38fe9bc99408b825c5ccca9bc84ffd7f6b469b376973e0ad557e1052f8b99f30e505403167a1bb0079f387e733ee680fb520bd6fbdad83eea04126fd9b36844de59314b0c6", 0x8f}], 0x8, &(0x7f00000020c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r2, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, r4}}}, @rights={{0x14, 0x1, 0x1, [r6]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r7}}}, @rights={{0x24, 0x1, 0x1, [r0, r8, r0, r9, r0]}}], 0xe8, 0x40}, 0x1) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1624.922722] FAULT_INJECTION: forcing a failure. [ 1624.922722] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.925372] CPU: 1 PID: 9262 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1624.926895] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1624.929391] Call Trace: [ 1624.929978] dump_stack+0x107/0x163 [ 1624.930798] should_fail.cold+0x5/0xa [ 1624.931647] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1624.932767] should_failslab+0x5/0x10 [ 1624.933606] kmem_cache_alloc_trace+0x55/0x360 [ 1624.934640] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1624.935729] __list_lru_init+0x403/0x7e0 [ 1624.936641] alloc_super+0x7f4/0x990 [ 1624.937470] sget+0x10b/0x500 [ 1624.938163] ? kill_litter_super+0xa0/0xa0 [ 1624.939105] ? devpts_remount+0x130/0x130 [ 1624.940024] mount_nodev+0x2e/0x120 [ 1624.940828] ? devpts_kill_sb+0x70/0x70 [ 1624.941703] legacy_get_tree+0x105/0x220 [ 1624.942613] ? ns_capable+0xd9/0x100 [ 1624.943454] vfs_get_tree+0x8e/0x2f0 [ 1624.944297] path_mount+0x13ba/0x20a0 [ 1624.945164] ? strncpy_from_user+0x9e/0x460 [ 1624.946146] ? finish_automount+0xa40/0xa40 [ 1624.947134] ? getname_flags.part.0+0x1dd/0x4f0 [ 1624.948208] __x64_sys_mount+0x27e/0x300 [ 1624.949127] ? path_mount+0x20a0/0x20a0 [ 1624.950031] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1624.951230] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.952383] do_syscall_64+0x33/0x40 [ 1624.953198] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1624.954315] RIP: 0033:0x7f9c93414b19 [ 1624.955137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1624.959139] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1624.960808] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1624.962380] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1624.963932] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1624.965486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1624.967040] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 1638.077426] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1645.504596] FAULT_INJECTION: forcing a failure. [ 1645.504596] name failslab, interval 1, probability 0, space 0, times 0 [ 1645.507019] CPU: 0 PID: 9281 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1645.508418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1645.510786] Call Trace: [ 1645.511338] dump_stack+0x107/0x163 [ 1645.512103] should_fail.cold+0x5/0xa [ 1645.512883] ? create_object.isra.0+0x3a/0xa20 [ 1645.513834] should_failslab+0x5/0x10 03:11:44 executing program 1: remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 03:11:44 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = signalfd(r0, &(0x7f0000000040)={[0x100]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.bfq.io_queued\x00', 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:11:44 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 03:11:44 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = fork() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r3 = syz_open_procfs$userns(r2, &(0x7f00000004c0)) ptrace(0x10, r1) ptrace$setregset(0x4205, r1, 0x2, &(0x7f0000000040)={0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002840)=0x0) r5 = clone3(&(0x7f00000028c0)={0x10820000, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x31}, &(0x7f0000000180)=""/202, 0xca, &(0x7f0000000280)=""/164, &(0x7f0000002880)=[r0, r0, 0xffffffffffffffff, r1, r0, r4], 0x6}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000340)='./file1/file0\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r3, 0x9408, 0x0) waitid(0x2, r5, &(0x7f0000000380), 0x80000000, &(0x7f0000000400)) 03:11:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:11:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x6, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:11:44 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) 03:11:44 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 28) [ 1645.514617] kmem_cache_alloc+0x5b/0x350 [ 1645.515769] create_object.isra.0+0x3a/0xa20 [ 1645.516870] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1645.518146] __kmalloc_node+0x1ae/0x4a0 [ 1645.519159] ? lockdep_init_map_type+0x2c3/0x770 [ 1645.520353] kvmalloc_node+0x115/0x170 [ 1645.521334] __list_lru_init+0x4c7/0x7e0 [ 1645.522373] alloc_super+0x7f4/0x990 [ 1645.523217] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1645.523332] sget+0x10b/0x500 [ 1645.525886] ? kill_litter_super+0xa0/0xa0 [ 1645.526952] ? devpts_remount+0x130/0x130 [ 1645.527843] mount_nodev+0x2e/0x120 [ 1645.528625] ? devpts_kill_sb+0x70/0x70 [ 1645.529465] legacy_get_tree+0x105/0x220 [ 1645.530327] ? ns_capable+0xd9/0x100 [ 1645.531290] vfs_get_tree+0x8e/0x2f0 [ 1645.532083] path_mount+0x13ba/0x20a0 [ 1645.533059] ? strncpy_from_user+0x9e/0x460 [ 1645.533968] ? finish_automount+0xa40/0xa40 [ 1645.534904] ? getname_flags.part.0+0x1dd/0x4f0 [ 1645.535907] __x64_sys_mount+0x27e/0x300 [ 1645.536760] ? path_mount+0x20a0/0x20a0 [ 1645.537605] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1645.538713] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1645.539817] do_syscall_64+0x33/0x40 [ 1645.540613] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1645.541707] RIP: 0033:0x7f9c93414b19 [ 1645.542500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1645.546377] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1645.548004] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1645.549518] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1645.551042] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1645.552558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1645.554068] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:11:44 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x5000) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7) 03:11:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x7, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:11:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x2}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:11:44 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 03:11:44 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) [ 1645.674794] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:11:44 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x5, 0x20) 03:11:44 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = getegid() setgid(r1) write$P9_RGETATTR(r0, &(0x7f0000000180)={0xa0, 0x19, 0x1, {0x80, {0x2, 0x2, 0x8}, 0x24d100f91a3e699a, 0xee01, r1, 0x9, 0x9, 0x8000000000000000, 0xb896, 0x6, 0x6, 0x5, 0x140, 0x400, 0x5065, 0x1, 0x2, 0x8, 0x7, 0x200}}, 0xa0) 03:11:44 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) [ 1660.229511] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:12:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x8, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:12:07 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x23210000) 03:12:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x8}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:12:07 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ftruncate(r1, 0x5) clone3(&(0x7f00000002c0)={0x4000, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x33}, &(0x7f0000000180)=""/152, 0x98, &(0x7f0000000240)=""/61, &(0x7f0000000280), 0x0, {r0}}, 0x58) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r4, r3, 0x0, 0x9bbb) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000003c0)={0x800000, 0x0, &(0x7f0000000380)=[r2, r3]}, 0x2) 03:12:07 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 03:12:07 executing program 7: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) getpeername$inet(r0, &(0x7f0000000180)={0x2, 0x0, @private}, &(0x7f00000001c0)=0x10) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) close_range(r1, r2, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:12:07 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 29) 03:12:07 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x2000) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x3000) madvise(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x1) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000100)=""/230) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffbfeffc, 0x100000) [ 1668.788325] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1668.808334] FAULT_INJECTION: forcing a failure. [ 1668.808334] name failslab, interval 1, probability 0, space 0, times 0 [ 1668.811291] CPU: 1 PID: 9474 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1668.812933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1668.815668] Call Trace: [ 1668.816310] dump_stack+0x107/0x163 [ 1668.817189] should_fail.cold+0x5/0xa [ 1668.818109] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1668.819338] should_failslab+0x5/0x10 [ 1668.820252] kmem_cache_alloc_trace+0x55/0x360 [ 1668.821358] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1668.822538] __list_lru_init+0x403/0x7e0 [ 1668.823537] alloc_super+0x7f4/0x990 [ 1668.824442] sget+0x10b/0x500 [ 1668.825197] ? kill_litter_super+0xa0/0xa0 [ 1668.826227] ? devpts_remount+0x130/0x130 [ 1668.827242] mount_nodev+0x2e/0x120 [ 1668.828125] ? devpts_kill_sb+0x70/0x70 [ 1668.829078] legacy_get_tree+0x105/0x220 [ 1668.830059] ? ns_capable+0xd9/0x100 [ 1668.830964] vfs_get_tree+0x8e/0x2f0 [ 1668.831869] path_mount+0x13ba/0x20a0 [ 1668.832792] ? strncpy_from_user+0x9e/0x460 [ 1668.833844] ? finish_automount+0xa40/0xa40 [ 1668.834881] ? getname_flags.part.0+0x1dd/0x4f0 [ 1668.836044] __x64_sys_mount+0x27e/0x300 [ 1668.837021] ? path_mount+0x20a0/0x20a0 [ 1668.837982] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1668.839245] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1668.840491] do_syscall_64+0x33/0x40 [ 1668.841384] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1668.842617] RIP: 0033:0x7f9c93414b19 [ 1668.843520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1668.847981] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1668.849805] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1668.851531] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1668.853241] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1668.854962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1668.856652] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:12:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xf}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:12:07 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) 03:12:07 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5b30000000000000) 03:12:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x9, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:12:07 executing program 1: setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e21, 0xfffffffc, @mcast1, 0x2}, {0xa, 0x4e24, 0x8, @local, 0x7}, 0xfff, [0x10b8a6, 0x7, 0xffffffff, 0x9, 0x1, 0x3ff, 0x7, 0x5]}, 0x5c) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x4800, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f00000000c0)={0xcd, {{0xa, 0x4e24, 0xde, @empty, 0x1ff}}, {{0xa, 0x4e23, 0x0, @private1, 0x5}}}, 0x108) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 03:12:07 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) lseek(r0, 0x3, 0x2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1668.988676] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:12:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x8f}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:12:21 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48000000) 03:12:21 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x200, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0)="9919de7e816357ca256fecfac845f3fb6aa9b3cb88f342e770e126a98695118b3a72383aacaac8a654acecc5eff8cf0a9bd95d909b3e6b0e86b24f79dc2ddbf15267f0587c6fae9b57a363ab549653e55234a1d082b689f3655e156fb0dc085104cdd2b7a899f3eb2cb86ad9e83ecef057f4b07e13808392f7feac2dbde82ba0e03e77e519103d964a35203609a31daf02e4e3cfba8359383d38f6e49154bdafbed51bccfe4bc2b39725ccfea890d3ecbc1f72281f909d85b13f70190a219967bfc023193c3cd1f742ee360f6a035dfbb3f21779383c819efaf7d37af331807ffaf51200d13810f226045ab40ffd03bbd2", 0xf1, r0}, 0x68) shmget$private(0x0, 0x1000, 0x1000, &(0x7f0000ffc000/0x1000)=nil) 03:12:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xffff, r0, &(0x7f0000000140)=0x1, 0x2, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000240)={0x7}, 0x7) sendfile(r1, r2, &(0x7f00000001c0)=0x200, 0xb1) write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7}, 0x7) clone3(&(0x7f0000000080)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:12:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xf0}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:12:21 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 30) 03:12:21 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 03:12:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xf, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:12:21 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback, 0x5027}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131000088a37329ea68553a3c06f898b0415d06e9edb87c745f973a5f00"}, 0xd8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) io_submit(0x0, 0x6, &(0x7f0000001680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x1000, r0, &(0x7f0000000180)="4f2c917fe8f01fd222f2bcf5e31340895b25546e6b073101ecc0fdf0ea177f883cbe13714ee4c675b301c9f1719024323b24", 0x32, 0x7fff, 0x0, 0x1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x4, 0xffffffffffffffff, &(0x7f0000000500)="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", 0x1000, 0x992, 0x0, 0x2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x9be9, 0xffffffffffffffff, &(0x7f0000000300)="b56eb52935e715", 0x7, 0x3, 0x0, 0x1}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x3, 0xffffffffffffffff, &(0x7f0000001500)="038ce71b867fcc2ca477732a677b766e0033d72b010bac01274cca2c8ff27592a9616fc1181b693cc65b1a42f101be622f6996dfe54e8190e86cc38da13dbc1e4b29b479066095c867e0abb9938f0c7ea92530799a5ebdfde18553bbfb6ab225bec3b74f41f02e19add04b71c0ddc5d2673817b88a95ce5f799e3e54f43f75f75a47dbc7f9dc06be7cf52845600147569c813d03cd444828107ee6", 0x9b}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x1}, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x7, 0x4, r1, &(0x7f0000001600)="8dcbd5b07a77b0be97c970c97a80d851802ffa9f28da0afbce144195e8a22569", 0x20, 0x1, 0x0, 0x0, r2}]) sendfile(r1, r0, 0x0, 0x9bbb) fallocate(r0, 0x20, 0x3f, 0x5) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:12:21 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000180)={0xa208a600, 0x0, 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1682.817132] FAULT_INJECTION: forcing a failure. [ 1682.817132] name failslab, interval 1, probability 0, space 0, times 0 [ 1682.819775] CPU: 0 PID: 9692 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1682.821251] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1682.823663] Call Trace: [ 1682.824246] dump_stack+0x107/0x163 [ 1682.825042] should_fail.cold+0x5/0xa [ 1682.825861] ? create_object.isra.0+0x3a/0xa20 [ 1682.826844] should_failslab+0x5/0x10 [ 1682.827655] kmem_cache_alloc+0x5b/0x350 [ 1682.828512] ? mark_held_locks+0x9e/0xe0 [ 1682.829369] create_object.isra.0+0x3a/0xa20 [ 1682.830292] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1682.831372] kmem_cache_alloc_trace+0x151/0x360 [ 1682.832365] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1682.833400] __list_lru_init+0x403/0x7e0 [ 1682.834271] alloc_super+0x7f4/0x990 [ 1682.835064] sget+0x10b/0x500 [ 1682.835745] ? kill_litter_super+0xa0/0xa0 [ 1682.836629] ? devpts_remount+0x130/0x130 [ 1682.837500] mount_nodev+0x2e/0x120 [ 1682.838266] ? devpts_kill_sb+0x70/0x70 [ 1682.839102] legacy_get_tree+0x105/0x220 [ 1682.839955] ? ns_capable+0xd9/0x100 [ 1682.840735] vfs_get_tree+0x8e/0x2f0 [ 1682.841520] path_mount+0x13ba/0x20a0 [ 1682.842326] ? strncpy_from_user+0x9e/0x460 [ 1682.843237] ? finish_automount+0xa40/0xa40 [ 1682.844163] ? getname_flags.part.0+0x1dd/0x4f0 [ 1682.845163] __x64_sys_mount+0x27e/0x300 [ 1682.846014] ? path_mount+0x20a0/0x20a0 [ 1682.846857] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1682.847965] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1682.849043] do_syscall_64+0x33/0x40 [ 1682.849820] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1682.850882] RIP: 0033:0x7f9c93414b19 [ 1682.851675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1682.855519] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1682.857109] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1682.858587] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1682.860083] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1682.861561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1682.863058] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:12:21 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c000000) [ 1682.886313] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:12:21 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 03:12:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x14c}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:12:21 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000180)=0xc) tkill(r1, 0x30) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:12:21 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68000000) 03:12:21 executing program 7: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040028bd7000fedbdf2501000000080004002c0000001400010000000000000000000000000000140001000000000000000000000053030000050005000200000014000100fe8800000000000000000000002a010108000200987bb03a02a30de1e9f45b81b9fb8cb31802650da1"], 0x70}, 0x1, 0x0, 0x0, 0x40800}, 0x80) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000) 03:12:21 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) madvise(&(0x7f0000ff0000/0xf000)=nil, 0xf000, 0x17) r0 = shmget(0x3, 0x4000, 0x400, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/216) 03:12:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x48, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 1683.008621] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:12:21 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c000000) [ 1696.630036] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1703.151692] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:12:41 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffffffff000) 03:12:41 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 31) 03:12:41 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x100) 03:12:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xf00}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:12:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x4c, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:12:41 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) execveat(r0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x6) 03:12:41 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74000000) 03:12:42 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x2000) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x3000)=nil, 0x1000) shmdt(r1) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x1000) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) remap_file_pages(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000008, 0x0, 0x0) r2 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000ffc000/0x4000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x1000) 03:12:42 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a000000) [ 1703.201385] FAULT_INJECTION: forcing a failure. [ 1703.201385] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.203805] CPU: 0 PID: 9885 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1703.205209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1703.207529] Call Trace: [ 1703.208085] dump_stack+0x107/0x163 [ 1703.208848] should_fail.cold+0x5/0xa [ 1703.209621] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1703.210661] should_failslab+0x5/0x10 [ 1703.211541] kmem_cache_alloc_trace+0x55/0x360 [ 1703.212580] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1703.213743] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1703.214872] __list_lru_init+0x403/0x7e0 [ 1703.215845] alloc_super+0x7f4/0x990 [ 1703.216717] sget+0x10b/0x500 [ 1703.217437] ? kill_litter_super+0xa0/0xa0 [ 1703.218397] ? devpts_remount+0x130/0x130 [ 1703.219351] mount_nodev+0x2e/0x120 [ 1703.220193] ? devpts_kill_sb+0x70/0x70 [ 1703.221096] legacy_get_tree+0x105/0x220 [ 1703.222021] ? ns_capable+0xd9/0x100 [ 1703.222875] vfs_get_tree+0x8e/0x2f0 [ 1703.223748] path_mount+0x13ba/0x20a0 [ 1703.224626] ? strncpy_from_user+0x9e/0x460 [ 1703.225613] ? finish_automount+0xa40/0xa40 [ 1703.226600] ? getname_flags.part.0+0x1dd/0x4f0 [ 1703.227695] __x64_sys_mount+0x27e/0x300 [ 1703.228619] ? path_mount+0x20a0/0x20a0 [ 1703.229533] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1703.230716] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.231905] do_syscall_64+0x33/0x40 [ 1703.232752] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1703.233911] RIP: 0033:0x7f9c93414b19 [ 1703.234758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.238911] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1703.240648] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1703.242257] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1703.243895] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.245501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1703.247105] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:12:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x4c01}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:12:42 executing program 1: r0 = shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) shmctl$SHM_LOCK(0xffffffffffffffff, 0xb) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10000) r1 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffd000/0x3000)=nil) shmdt(r0) shmat(r1, &(0x7f0000ffd000/0x3000)=nil, 0x2000) 03:12:42 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file1\x00', 0x200000, 0x20) pidfd_open(r1, 0x0) 03:12:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x68, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:12:42 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) [ 1703.344384] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:12:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x8f00}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:12:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WDS_PEER(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010000000000000000004200000008000300", @ANYRES32=r3, @ANYBLOB="87212a5115bee8739d21ccfc4f17463b276ea68240ae36b995e86e57e221b4ed36fe922f07839a85a1b516c076b3c9e823b75a17af3c58921f9651fc79c618d24547ae1586fe6d735ae93b5c8e44dcd72808bb4ff66de77d40e90d19cc61abdd567737dfac5136ec642f198345d7693cbe363cb5dff96c661d8c2a364d6a8142ed96afe714af9b8707a8dff793bc276094e757e25c9ad52ba55bd36c085f0ec7e3a36b50fa2acaa0fa34b20c791063d6331b35ba3f94acc5f858b386dd163ef9bf8351f5a4364768f6"], 0x1c}}, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1715.407279] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:13:01 executing program 1: remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) r0 = shmget(0x1, 0x4000, 0x240, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_RMID(r0, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffd000/0x3000)=nil) 03:13:01 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80040000) 03:13:01 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x62400, 0x1a5) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7}, 0x7) openat(r0, &(0x7f0000000180)='./file1\x00', 0x163041, 0x43) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) getsockname$unix(r1, &(0x7f0000000280), &(0x7f0000000300)=0x6e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$FITHAW(r2, 0xc0045878) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0xa8640, 0x0) read$ptp(r3, &(0x7f0000000100)=""/89, 0x59) 03:13:01 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 32) 03:13:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xf000}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:13:01 executing program 7: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="0000187aa9dbf3cfc46eb618e5ef649681ee0e00", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x100031}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpu.max\x00', 0x2, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000001c0)={0x0, 0x3, 0x3480000000000000}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:13:01 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000180)={0x800, 0x0, 0x0, 0x0, {0x2e}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r1}) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "198be94fbb35c897dcf37f04ebd4f9f4ecd9bf010e61f00f837f8e57242cba52965f202765246dad807ffa6de0379fed4c517d5e92f64077beb89fbb4c6a4ca9", 0x3f}, 0x48, r1) keyctl$chown(0x4, r1, 0xee01, 0xee01) 03:13:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x6c, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:13:01 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) [ 1722.916485] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1722.942684] FAULT_INJECTION: forcing a failure. [ 1722.942684] name failslab, interval 1, probability 0, space 0, times 0 [ 1722.945093] CPU: 0 PID: 10134 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1722.946517] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1722.948865] Call Trace: [ 1722.949420] dump_stack+0x107/0x163 [ 1722.950180] should_fail.cold+0x5/0xa [ 1722.950978] ? create_object.isra.0+0x3a/0xa20 [ 1722.951949] should_failslab+0x5/0x10 [ 1722.952733] kmem_cache_alloc+0x5b/0x350 [ 1722.953568] ? mark_held_locks+0x9e/0xe0 [ 1722.954414] create_object.isra.0+0x3a/0xa20 [ 1722.955319] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1722.956384] kmem_cache_alloc_trace+0x151/0x360 [ 1722.957357] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1722.958378] __list_lru_init+0x403/0x7e0 [ 1722.959233] alloc_super+0x7f4/0x990 [ 1722.960027] sget+0x10b/0x500 [ 1722.960674] ? kill_litter_super+0xa0/0xa0 [ 1722.961545] ? devpts_remount+0x130/0x130 [ 1722.962411] mount_nodev+0x2e/0x120 [ 1722.963168] ? devpts_kill_sb+0x70/0x70 [ 1722.964009] legacy_get_tree+0x105/0x220 [ 1722.964848] ? ns_capable+0xd9/0x100 [ 1722.965622] vfs_get_tree+0x8e/0x2f0 [ 1722.966395] path_mount+0x13ba/0x20a0 [ 1722.967199] ? strncpy_from_user+0x9e/0x460 [ 1722.968107] ? finish_automount+0xa40/0xa40 [ 1722.969005] ? getname_flags.part.0+0x1dd/0x4f0 [ 1722.969999] __x64_sys_mount+0x27e/0x300 [ 1722.970839] ? path_mount+0x20a0/0x20a0 [ 1722.971684] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1722.972765] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1722.973836] do_syscall_64+0x33/0x40 [ 1722.974602] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1722.975669] RIP: 0033:0x7f9c93414b19 [ 1722.976437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1722.980232] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1722.981805] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1722.983276] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1722.984771] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1722.986245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1722.987724] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:13:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x74, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:13:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x34000}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:13:01 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x2, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0x10, r0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x1, 0x0, r0, 0x0, &(0x7f0000000040)='./file1\x00', 0xd0, 0x30000, 0x23456}, 0x7860) 03:13:01 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) getsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000100), &(0x7f0000000180)=0x4) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x41, 0x0) listen(r0, 0x800) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file1\x00'}) pidfd_getfd(r2, r0, 0x0) [ 1723.102511] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:13:16 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 33) [ 1737.976999] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:13:16 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff) 03:13:16 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x200, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) ftruncate(r0, 0x4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:13:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x80000}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:13:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x7a, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:13:16 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x1000) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x115000, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) fcntl$setsig(r2, 0xa, 0x6) r3 = syz_open_procfs(r0, &(0x7f0000000200)='net/ip_tables_names\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000240)={@desc={0x1, 0x0, @desc2}}) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r1, 0xc0286687, &(0x7f0000000180)={0x2, 0x5, 0x61, &(0x7f0000000100)=""/97}) 03:13:16 executing program 3: syz_io_uring_setup(0x25, &(0x7f0000000080), &(0x7f0000fe9000/0x4000)=nil, &(0x7f0000fea000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r0, r1, &(0x7f0000000580)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r2, 0x0}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r4, r3, 0x0, 0x9bbb) syz_io_uring_submit(r0, 0x0, &(0x7f0000000040)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x5, 0x4004, @fd=r4, 0x10000}, 0xb468) request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:13:16 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) r0 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) shmdt(r0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffa000/0x4000)=nil, 0x4000) shmctl$IPC_RMID(r1, 0x0) shmdt(r0) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) shmget(0x3, 0x2000, 0x100, &(0x7f0000ffb000/0x2000)=nil) [ 1737.996607] FAULT_INJECTION: forcing a failure. [ 1737.996607] name failslab, interval 1, probability 0, space 0, times 0 [ 1737.999190] CPU: 0 PID: 10266 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1738.000635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1738.002950] Call Trace: [ 1738.003499] dump_stack+0x107/0x163 [ 1738.004282] should_fail.cold+0x5/0xa [ 1738.005070] ? create_object.isra.0+0x3a/0xa20 [ 1738.006008] should_failslab+0x5/0x10 [ 1738.006788] kmem_cache_alloc+0x5b/0x350 [ 1738.007621] ? mark_held_locks+0x9e/0xe0 [ 1738.008474] create_object.isra.0+0x3a/0xa20 [ 1738.009375] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1738.010425] kmem_cache_alloc_trace+0x151/0x360 [ 1738.011399] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1738.012427] __list_lru_init+0x403/0x7e0 [ 1738.013286] alloc_super+0x7f4/0x990 [ 1738.014068] sget+0x10b/0x500 [ 1738.014720] ? kill_litter_super+0xa0/0xa0 [ 1738.015590] ? devpts_remount+0x130/0x130 [ 1738.016469] mount_nodev+0x2e/0x120 [ 1738.017220] ? devpts_kill_sb+0x70/0x70 [ 1738.018037] legacy_get_tree+0x105/0x220 [ 1738.018870] ? ns_capable+0xd9/0x100 [ 1738.019645] vfs_get_tree+0x8e/0x2f0 [ 1738.020424] path_mount+0x13ba/0x20a0 [ 1738.021217] ? strncpy_from_user+0x9e/0x460 [ 1738.022107] ? finish_automount+0xa40/0xa40 [ 1738.022996] ? getname_flags.part.0+0x1dd/0x4f0 [ 1738.023998] __x64_sys_mount+0x27e/0x300 [ 1738.024830] ? path_mount+0x20a0/0x20a0 [ 1738.025649] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1738.026723] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1738.027781] do_syscall_64+0x33/0x40 [ 1738.028567] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1738.029622] RIP: 0033:0x7f9c93414b19 [ 1738.030383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.034097] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1738.035636] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1738.037092] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1738.038531] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.039992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1738.041447] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:13:16 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x40001, 0x10a) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0) 03:13:16 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0020000) 03:13:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x400300}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:13:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xf0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:13:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WDS_PEER(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010000000000000000004200000008000300", @ANYRES32=r3, @ANYBLOB="87212a5115bee8739d21ccfc4f17463b276ea68240ae36b995e86e57e221b4ed36fe922f07839a85a1b516c076b3c9e823b75a17af3c58921f9651fc79c618d24547ae1586fe6d735ae93b5c8e44dcd72808bb4ff66de77d40e90d19cc61abdd567737dfac5136ec642f198345d7693cbe363cb5dff96c661d8c2a364d6a8142ed96afe714af9b8707a8dff793bc276094e757e25c9ad52ba55bd36c085f0ec7e3a36b50fa2acaa0fa34b20c791063d6331b35ba3f94acc5f858b386dd163ef9bf8351f5a4364768f6"], 0x1c}}, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1738.143890] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:13:17 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 03:13:17 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file1\x00', 0x200000, 0x20) pidfd_open(r1, 0x0) [ 1750.267497] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:13:38 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x408002, 0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:13:38 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x2000) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x3000)=nil, 0x1000) shmdt(r1) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x1000) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) remap_file_pages(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000008, 0x0, 0x0) r2 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000ffc000/0x4000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x1000) 03:13:38 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x80682, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) fcntl$setlease(r0, 0x400, 0x1) 03:13:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xf0ffff}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:13:38 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 34) 03:13:38 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff) 03:13:38 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0x5}}, 0x18) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x187a01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) r3 = eventfd(0x6) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r4, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r5, &(0x7f0000000240)={0x7}, 0x7) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r6, &(0x7f0000000240)={0x7}, 0x7) io_submit(0x0, 0x8, &(0x7f00000017c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x3, r0, &(0x7f0000000140)="eae7ae355f9fef576b73f663653fbb867acf31add8f176f3a8ffa52df4eff87c5bbd6086a9ec464f570ebec58f2dcd8348b48a2a3082c704c258b83c99d725828ba7759268bcf6f748abfbec1fc730b3ba1bff4cf65c41e36fb40c67b8ddaab86fbf4cc3dc42c2e585e8afdde23c4195d7e25897626bb7700fe93d333b397a184f63c33bd13cf5359087a80b1e59eb9f91bbb57660e6251ec421f86f52a7aa38ff35", 0xa2, 0x73, 0x0, 0x3}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f0000000380)="b4818e032a2687cba8bf70d7796aae0b8e0a2515f845f83b5ffe147f07499ea6b9855816d004df6690e8441aac71ccb1463b82efa93c773b5088be538fd174c5973e7fbc2a350356eec85c5f4f37e8b7e506de54d2bfa29ae08ddbe56f6b5172338d2c126244140b6d75bf6eebd2eddb1d5a9ea3a5caf1afebb5ee44730bad9b14a240763dd37812c8b0de5275d64cba503f989efbe8b6c8812583097f3fd6cebd9702733b4f67986524f3ee1a6aa13cb6e437f26b4ccb42e42f65002bb42e34f6b663372290ff35ddb51a9733128983c9ef6e31ffd21f39b6620d93dfead6579dec23cda0d2f6c399904dae4845a6a9153eb6a853ffde512b8166914bf3e27ce2e0da70668ef9d2f92d90b70013085cfcaa2983efc0853512a155c202a328bfe51bc7a4396062e84300033c53806dd40fccb739c8295619b5d1ef1f0f8958b2c7b9e420b448b519e6187d3ce3c5142688836755c1c321bd8024a6ab69609bbcbd0a06c7e6da5b2033a64d4e84d5a289141d75db48c1e40362d9e9b6d15011a8619829d0507dbc67a293b4937267faa517705fa1fce7c0bf6220bf9c1804041a3e99f322c82b6b7ecc447e3c451816fb50493f7806a30c5e8faecfeeda3932d2ef70ff363f61a80d2654e37168e492d8ec6575b0faffd3c21b639ec975154fca18a1d2c7c8613ed6a9c54c4ac61b23516fec50e709710febf82917f5ba679e9249a6f96b1eb3e60370efa35f009e9a8db4e1163b18c50c50d6b1b4757d54d44515f80f94689045b314069f978de6f07a3965cb28d0b6ff531591d9c6a68c50a9fc1878764c3c7d523f1c8fad688e38f8518cdee81ce2ff7356d2618d41868ac8a81686917c498fc97cf0fc1f16186c2ac6e31fff0cdf15bb1f47265497227b5b0f6d3346e0272774eca7f395279e0258e4e487d20cc7b90df061e64465e62d91e4962c8ad7003dae87be7f0fd301bce9211deec5e16ac54b0ba82aeda7978a49897d5ba1bc1aae7ad44f1cbbc0c714502c8d13a501301093c21499567c157fa67b2ddcb38473119c73f9b613a0c1d0a009b03fcdb07e29c0fc2ccfcb8a9ce9e1e8715f8b367009750fec1831605ca35476809964b7eaf6cb32d5f0ce142fd29044171939cc17faea06f149e78707d89e3484290e6687c9fb1621997f81643d8d665c326cfbc67999e36340220b4d3666e8b3c1cc762a8ea9d3a6addba04b0b1ad92cfc447716b4f9a0e78a62a14ae28772d19a7652017ea16bd2b3fec23fd751468e87585f6fc758bb238379d405f68a28c6a7fc6f3641dd46dbc6031f8051c911c8043b1bc2e1a0256d9eca09790db6154becee4ef8bebed32d6ae8706fbd79f328e4d49f3d8bf8f258f6aec349219f67ff59a362a01e1153bd05ee0bd27076e8565d6423bd98b32777a80bbe77bb9716dacfd99a443273bc3295ce18a4dc0f39fcd308f91bfcf6047a6815e4a098392a28e9662f42cf9923dfdaf26b932f93c576b7d8c660f81d1f164759b3a608bff6b9c81438a0da154ea5bbbefcd7d1f03f074bf270a55e72c1636c5f9aa5b5ad79b7433bdd0bb172c2fb59fa89aae07f0ce21ee0805c2efe997606ae793bd9bffcef68140984678baa555c08b6758ff87f8265030797b592a70a6941e5b2b910b711b7580f5fc2dcea94e92a0525aff3a3a13df338ed8981f9d5892f925778a355f0b1211e1a35377387fbe0519442b5cd9cdd6837ddc23aafd04c8001dc99845d1327f1b3b5f8aa3f18ad8ed03ea5300d9b4639cb8a140bb847532d8c0d2a555a70286a2cdccb89150ebb0ef2ec09a02e4365a6dad8f3b9313c4168cfd58efe2c27c2b473be67079e2e6810ad6fea22b785caa580ddbca3e9409a9bba80e35c21d91cb909d6f3ba31b96dc46f324d83ecd36d4c87493d4d0f04b85b80cd77dba17ed5fc709a665a9f912ff6fc83869e1fd9437aace780c15eda2cb9572dff5600a547d6cb772761d389451add4ccc1dd71528342c046e6e7cf43ce40f8e13c47ca991cc8ad092ccb4418aeba52240206de97db21f89f8a53f2ab7f5783c8b97a6656eb41dc7965c27a6b02a7a9d7251cf51342837d314d61efdea9c2a331bb58767132f6ab67e2d0d62ce0fc0d82ee012e46b87607a0eb3cdc2928294c7c9cdf7b497b66f0c685ae77f4a72added63c1d5fac432d0d7cf1f6b3d9c588ffa21eeb1a31b39e9896c6e79c25b2d78d4f822611fb62f2feb65a6095dc2b59ce0f522110292d469fee1060ef2ea56e2bf6ccb27f3d3f77a28a1b32dac42b3b2ac9645ebcac0790b9bdfa7fa4d3d1005ddcb0d87486ce176c906ad407a6139794bdb0c6084072bd7b81a4a139cd984d86c1c4cdb77e0d36c39447771ae2f9c1e60bc3d69f2961d5061abd1338b239bbe17f53ccc89b0172e943542f20a125905bd0bad7b1255bbed0fbbba09925409f58bb987ac545ee114cc52fd32e552a66535d6e4137663eac9f5fbe2b7b05a012ba2c9b37ed6a1ac61f49263876a4b3c179e9e5f1c93c7be72357f848b7ed97a743bb6d6f35a7d0a4f98d613070aeddca26812c2cce81ca5e6245ef79f2932a59cab46fbbc882699160d34696341c268e7111ac954e03af17eaa9f6730d24ad6affff1ced6849f4b75aaaa758b41cbbb39880513cdaea6a1b422b9f29ede8b61844caf7a7c36286e08373ee36c10da3a68e5b08d89a29f98c7f742f993c18538382b6743691aec04f7a1f6ae43bd4871830e2e29de97188e42a7ec500e5de512b0e69f89643ecb0ab13532ac1cc93330632bc20d1a1c40c9bd843e2e55f169da816f9ef931a2bd1433e925a96cd527c6e9fafbc3ec19b106539ad98b919483276337135846a6c93431b0ddcb26760152f267fa845c8baf5eb59ebfd67c26149d6019957ce6f7c5b04e0c89723ffac65d433db61d2dde9c5973b56b508e19b297a3d78507d61f7b99e723864ed638fbd5e757f3bd7cef8ec1f0f8ee0a86543ddffbc51239000d66429269e77b8058fb87533cdf6d1851eb90120b59127a227ca998ad59db1e81e17779834225302b370b5bb63b611d977011f764a5a8b5b73e430f610821ad4fc1bf843dad4c57668712292d4d8845fbef4603e8a805a13e143b20ffc9462db28e82a6e45b0a0c5101a7cf572c8b4434b7d6a680dd3ce959d9390e2e39495586fdc782c4318ea8b72ae3166c7c0f7d38de94dc5e333936365a0022f637c73bcced2d3fa8125b39c13091882f647d5adcb41995ed8201465a11cf6af794b70e0ca2cde2ead1b1e09e7f2a5a7bb7108f4cb3a2c009b693048404cbd90cc552617cbfb115d6a2ae35e0b017dd8abb987e4a0a458fd3163e0f304a2788a10b62941e8be0c6936c6564c190456e9a243edcd7cbd87811ee62ea69d37fc30a03c2c7956c2b28e82e602d67ff1f11ab6016c32b37d79bd88ad14e62c0c3b6a2a1e7e94420861f2bde18ea782025641a2a5d11d831405a2394de1e924d27121afc240cd54764f0be6e23476ce95db3261396f4c45442a560e6f9e887c295e47ec1a8c17c92b00de574394db384422ecebbc2fbe52fc5bed5bdc5502dff530e7dbfe51a694dc636c30c86f68eb7ed0e5110166e445b2fd51c0810a91ee3e18827a8d8bc15e7654ed889aeca799a74eb2cf4bec35ec65052211927a35a690099f964f8c34c50e79bf5a313783c5afeb6c4c0a17c2283134bef624442c908234ee0d2f24f377e4bf65dae4cb400833c8f732557fe336d318f8679e89b896f006f04070b26929809d501942e6db0b716ad8927319153eedfd08448ac79d00fa2e696b346364ec52f0b2217510a4a48b81baa601ec76816218f0d26547d28581bfa76533a6a781ad3aa419f25371a299053e1880475e875596059c0e855b41671fb0d012218e64bddc5e78627251f832e4c2fdfef30418e8a24b38e29f08c0683b326f05912cd94a3f36c12153bd74018804bf605d109bf51beeec8adb50ab9e8dcd7a74dc8fcd6f21430260471bac6a338b4b2fd0d73ec9df61c0572f8a3b298a324765a45c116591493afc1eede3d7f7d05f8e23191d13d35cf2ee959c23c8de4ee9c0c6e595fc2bb5e3a9c05736a9042b36e2ddef3510429886ee496c5cfee24242a33649101502c61385a771ab3c97c26148647ea3568039ba498b2727c801362eb98be511504b683227e9d39f7dd2da23f3180308444f2115016814461d159271cf43d5358dcb4eb629b260d6db6a61eb52012265082e598b4898f0a89fc9a67b44f99d2139e418eb9fe4054c3282d5b23d45d50bdd7a640b8d489f5d339c0fe17c93350c7ada5f2dc78a210b17a9ddd840221441dfec7883a30b778fe62337c6002eb286eb0002d12000a9e587d1ee06e9c022d3f7c530b2a0e8c3440ab220a5d74799033fa736a5553267cf5e1675ef7723f6586c52ed268ffefde313bfd3cfb135b8f6817f03256157801bf4adf0504fa50c98924dec37ee3bae954e2c7fb8c1a43c668afecb327396e214abb1b28e2fd823ae153713588dbb4d02b4db2d11ee7d2a8d1c15db6bf1cd50d612354e41457bb317450e418d76537955d46be00a47e68fe7c8aa2905e14171480f1448e8f0b27aa84e8532ed3fe14950ddccaad29ebb2aa30359489c7223a46212775b1a945a388b1e4128a3b33ce4007b9ced0916a13127fb909bda1c32ed2adfee4311cef31497246aadc574990fa3cabf0f107fe8a4c27b83066bd614ae1095243bb70e5eb5071cf19d10577b42110438a101287724dfb0563e9225f1e1f528cdaf1f98db5f82a58be018445ef3d00b90857b80a3fc4097a3130f794d73ff6b187f332cc1d0ae11706c8e00b2031ea8c227642cde727bb9d64f4c7e09e719c9d978af8899e30546ecbe2262fed10c9fdef917328bea89405e7110777a9e25f9843abc35079b3e607908c9008ef119b5611e0e082a11af43fbf2ea4dce8a235affa1c3e8371ca02a6030184f4e9e702b5257ec1f3ac28fab1499b894b18c85e89f2df3371c5e81233c139227994a6d6449a514a57a6b88d68774508c86dc62d356bfe0221aaa76771da59d4331780a3f72601254a329a2637321d678d470eb0d2baa6112a24dadf1d50f4f03c7bc4dda3c9f7fb1ac7feeeb34dc3cf55dc87493daeadf46fd83025a1562ccdbc44f159237ae2cb2cde8da5d05b8a8a366690a7ae869c69e95e4dc2d1026b71af0dd5922a2de7f61de48bcae14418d8faa988aef97c811254fb26941e989f035424df2cbea7e50f6229c22ad7c911455cace2f2215cd703b28e356db2e85010f745db2e5cc53ecf1eefd1dbe649e6a2080a9e6c6a5b16db314c2a4fd2f32e025fc63d850dab76367249ea69ef593a4ae32634a21dee086c542e9d8c7bf6d2673e2b3416016b11c7162a97b97fea8045f78705da2b28bea905991b0971714eba406dcb0cdb36006c7b1017221a12387dfb479881e875a50c5cf4c7728966161b7c2254db7b8fe481c3c45510639718172a829cfc5365734daea379e3014d89079da5d441081e4018078247f92f6f07efec8ee2f04d5497c1fc7650d440acb2c42b20934c989f9e9ae4257605f347bfdcbc800737e5d5aedde17e664ad4b249909d1bb9dc29198f089492f63c0807caee1173776bf7b0a162b56a542ae8d95d672489ad9c0a8904e1337697bfaef3dfe4e8273c9ca640080aec19c0f8d2af39e1c239f52a8ee0ade4c258f7c7a4d7bb1ea0d162db2c88a40fc4b2ae4935d18f5a27f3f02281bf61211afcb2a3739cfe4a11208adc69bd2e6230ca00af49fc8a892519125bec0c09315", 0x1000, 0x7}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x100, 0xffffffffffffffff, &(0x7f0000001380)="885ff78cc14ef61244470eede5ac35647bbe698e19cb991abd158d196a4bfcae45720e26a5646416553c319ad062061b2aef9c9d389333b076d22da164e79d20486ac98165e04401b29d166074ea0b8bfcef48356e837fc58716dbaf1edd0c995e05d2998a881af6d2464f77ad70deee0d4c8978224c5772312cc9ae6ea7bde4143002486636383cdc5315", 0x8b, 0x6, 0x0, 0x3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x7c, r1, &(0x7f0000001440)="a25f24713555a79b4617bcee9987ccccfec3b9bce5f0cfe9a32122cdd69afb83e960a4eeee91784f9f2f025f4e80460dc4b36bd89552772bf4afff255c6e7334bae2f4e8a401bfa77fc997198b2b9aa499c6d57a9ce05c207a24fbdab9e0b86289afb12652c62a6a9f38cdbba245f5d6ba615cda1167711e58964a2b737d72f4aadb565b2d679f0ce8fd992ac6a0391a3d103acd540913deeb62a6b82f71bf1901ac0a29a56b6f63232abd5d46a5d6cc16604d54cb48f93f605cac3d0c8c54eaa59c1c1a16dbaf75235685a5b6302a9ee6b2cbcb70eb0586acdf36c96a3634b35ca64ae6058c71ec", 0xe8, 0x1, 0x0, 0x2}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x5, 0x6, 0xffffffffffffffff, &(0x7f0000001540)="c6bce3bfa3bc4d3ea3b2813d7cc653da908eddfe0b76f323b9b15e8c1acae0833b4e4f6ae4ee04654505cbd63ad5ca10b37c094bb220d91dfd13cda58a638846dac4dede1efa5b020f58816dbfdabcb3249de33167fac7727a393eb8c66233523407a46ef94d523b078bc1785e94eff114665d8f6c15ed64d2bc2285b25a", 0x7e, 0x1, 0x0, 0x1}, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x3, 0x400, r0, &(0x7f0000001600)="e510aa073883e9121c5a31ab9d5fe9255d56c86f8567fc1dd7278e66ed237e1aa6bfec6b4907e0b5d0660474fa4a098b88cbd0bf8589c5a06d149b27b9d7", 0x3e, 0x2, 0x0, 0x2, r3}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x1, 0x4, r4, &(0x7f0000001680)="7448ef626d2ab6fe007dcba3b9307ac13344babc2e40d277629e72cd6386a8", 0x1f, 0x4, 0x0, 0x1, r5}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x5, 0x5, r0, &(0x7f0000001700)="a62a93744b0a39cee77dabf358e1f10c890b845809356a6bdcd1357d706b9f7eec6b62b6ca8830b92e149b6c7a0618bb7b6ce493d346ca42cdbe34dc59475683100aa782d98cb124137af92fdea63e24d87c36535b214e952c18fe3a4a54b3b5af157c1d", 0x64, 0x2, 0x0, 0x2, r6}]) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:13:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x14b, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 1759.718515] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1759.722159] FAULT_INJECTION: forcing a failure. [ 1759.722159] name failslab, interval 1, probability 0, space 0, times 0 [ 1759.724850] CPU: 0 PID: 10433 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1759.726267] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1759.728799] Call Trace: [ 1759.729361] dump_stack+0x107/0x163 [ 1759.730130] should_fail.cold+0x5/0xa [ 1759.730919] ? create_object.isra.0+0x3a/0xa20 [ 1759.731869] should_failslab+0x5/0x10 [ 1759.732666] kmem_cache_alloc+0x5b/0x350 [ 1759.733518] ? mark_held_locks+0x9e/0xe0 [ 1759.734356] create_object.isra.0+0x3a/0xa20 [ 1759.735264] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1759.736320] kmem_cache_alloc_trace+0x151/0x360 [ 1759.737295] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1759.738309] __list_lru_init+0x403/0x7e0 [ 1759.739168] alloc_super+0x7f4/0x990 [ 1759.739942] sget+0x10b/0x500 [ 1759.740606] ? kill_litter_super+0xa0/0xa0 [ 1759.741470] ? devpts_remount+0x130/0x130 [ 1759.742330] mount_nodev+0x2e/0x120 [ 1759.743082] ? devpts_kill_sb+0x70/0x70 [ 1759.743906] legacy_get_tree+0x105/0x220 [ 1759.744758] ? ns_capable+0xd9/0x100 [ 1759.745531] vfs_get_tree+0x8e/0x2f0 [ 1759.746311] path_mount+0x13ba/0x20a0 [ 1759.747107] ? strncpy_from_user+0x9e/0x460 [ 1759.748004] ? finish_automount+0xa40/0xa40 [ 1759.748918] ? getname_flags.part.0+0x1dd/0x4f0 [ 1759.749913] __x64_sys_mount+0x27e/0x300 [ 1759.750752] ? path_mount+0x20a0/0x20a0 [ 1759.751584] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1759.752671] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1759.753739] do_syscall_64+0x33/0x40 [ 1759.754514] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1759.755565] RIP: 0033:0x7f9c93414b19 [ 1759.756352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1759.760106] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1759.761699] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1759.763159] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1759.764624] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1759.766088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1759.767552] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:13:38 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='rxrpc_s\x00', r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$P9_RFSYNC(r2, &(0x7f0000000100)={0x7, 0x33, 0x2}, 0x7) 03:13:38 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff) 03:13:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x300, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:13:38 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x3}, 0xc06}}, 0x18) close(0xffffffffffffffff) r0 = syz_open_dev$hiddev(&(0x7f0000000040), 0x539e, 0x2a500) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:13:38 executing program 1: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74000000) 03:13:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x1000000}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 1759.889210] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:13:38 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 35) 03:13:38 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r3, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r4 = fork() stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="d520600b5d9a48aad16a1f6997b529fe59def7d89b0679f0daa6d53ee823a4ee41d109b2c8fef01e643d8cac67806f5846a44fcbe5cbd11615a7070f2491fe885c8da4454a2c3be5b9c488c6bbabc8339cbdce2bd20d12360417456c1b109c7f81832d9968209707a9b1977f1a3b3ba67aec2ae7bdf7ade11ebaee9c05e142de7dc628c41ceb735e6b440b51d9d89faf8b59a279a347e9c56d2e80b9a18020ee3557bef7655b3ed1c44a6e73406b96976216516a01edf633a8514e51f59bb3ba46abb4059fc5dc4ef4e5908af4d125d35f1a3261eb74611b6db1ae64f281b019", 0xe0}, {&(0x7f0000000040)="de453e55bedddfbde0", 0x9}, {&(0x7f0000000280)="6fa67acadf170d09fc79f792c1c353f5274b26ff0b61491a7c18204590", 0x1d}, {&(0x7f00000002c0)="a73c8dbad50078813b5cd34cf9cbf8ef664f5308099ab68aded1f3b88aa4c1ec2aaa131144291b9a24cd715fda259a7bd6dc1fa6c1d52d40ad1678913836ef6de30284058fef31cf1ba2f8701356b0b26591be86e002d57686df425ab8192ca723a29c8773aa1dd543bfca463104fc96030a4e33053ecb5317fb5f9c1f5b26eeac0a745635e7435b1ceba06dc55ee6e39863ed258103c7271016adfe22b097e667083ca296e613767b25ee93c9d978b6c250472b550739e1e9b27bd1c8af40b77628bb68c8980fc83654568812bd1833", 0xd0}], 0x4, &(0x7f0000000400)=[@rights={{0x24, 0x1, 0x1, [r2, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee01}}}], 0x68, 0x10}, 0x4008800) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1759.968618] FAULT_INJECTION: forcing a failure. [ 1759.968618] name failslab, interval 1, probability 0, space 0, times 0 [ 1759.971098] CPU: 1 PID: 10556 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1759.972541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1759.974862] Call Trace: [ 1759.975406] dump_stack+0x107/0x163 [ 1759.976180] should_fail.cold+0x5/0xa [ 1759.976970] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1759.978015] should_failslab+0x5/0x10 [ 1759.978801] kmem_cache_alloc_trace+0x55/0x360 [ 1759.979740] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1759.980797] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1759.981816] __list_lru_init+0x403/0x7e0 [ 1759.982665] alloc_super+0x7f4/0x990 [ 1759.983580] sget+0x10b/0x500 [ 1759.984435] ? kill_litter_super+0xa0/0xa0 [ 1759.985491] ? devpts_remount+0x130/0x130 [ 1759.986427] mount_nodev+0x2e/0x120 [ 1759.987166] ? devpts_kill_sb+0x70/0x70 [ 1759.987990] legacy_get_tree+0x105/0x220 [ 1759.988827] ? ns_capable+0xd9/0x100 [ 1759.989603] vfs_get_tree+0x8e/0x2f0 [ 1759.990366] path_mount+0x13ba/0x20a0 [ 1759.991152] ? strncpy_from_user+0x9e/0x460 [ 1759.992032] ? finish_automount+0xa40/0xa40 [ 1759.992918] ? getname_flags.part.0+0x1dd/0x4f0 [ 1759.993873] __x64_sys_mount+0x27e/0x300 [ 1759.994710] ? path_mount+0x20a0/0x20a0 [ 1759.995530] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1759.996629] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1759.997686] do_syscall_64+0x33/0x40 [ 1759.998451] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1759.999491] RIP: 0033:0x7f9c93414b19 [ 1760.000265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1760.003991] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1760.005619] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1760.007078] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1760.008564] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1760.010024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1760.011504] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 1773.120202] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:13:59 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x2000) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x3000) madvise(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x1) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000100)=""/230) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffbfeffc, 0x100000) 03:13:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x500, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:13:59 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000200)={{}, 0x0, 0x1c, @inherit={0x70, &(0x7f0000000180)={0x0, 0x5, 0xfffffffffffffffd, 0xe1, {0x27, 0x2, 0x20, 0x0, 0x6}, [0x2, 0xce, 0x0, 0x81, 0x9be]}}, @subvolid=0x44eadc91}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1780.472524] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:13:59 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 36) 03:13:59 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xff0f0000) 03:13:59 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x22}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:13:59 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file1/file0\x00'}) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000100), &(0x7f0000000180)=[&(0x7f0000000140)='\x00'], 0x800) 03:13:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x2000000}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 1780.504235] FAULT_INJECTION: forcing a failure. [ 1780.504235] name failslab, interval 1, probability 0, space 0, times 0 [ 1780.506621] CPU: 0 PID: 10585 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1780.508044] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1780.510376] Call Trace: [ 1780.510925] dump_stack+0x107/0x163 [ 1780.511687] should_fail.cold+0x5/0xa [ 1780.512484] ? create_object.isra.0+0x3a/0xa20 [ 1780.513425] should_failslab+0x5/0x10 [ 1780.514206] kmem_cache_alloc+0x5b/0x350 [ 1780.515038] ? mark_held_locks+0x9e/0xe0 [ 1780.515881] create_object.isra.0+0x3a/0xa20 [ 1780.516786] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1780.517833] kmem_cache_alloc_trace+0x151/0x360 [ 1780.518801] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1780.519814] __list_lru_init+0x403/0x7e0 [ 1780.520685] alloc_super+0x7f4/0x990 [ 1780.521469] sget+0x10b/0x500 [ 1780.522114] ? kill_litter_super+0xa0/0xa0 [ 1780.522979] ? devpts_remount+0x130/0x130 [ 1780.523835] mount_nodev+0x2e/0x120 [ 1780.524592] ? devpts_kill_sb+0x70/0x70 [ 1780.525406] legacy_get_tree+0x105/0x220 [ 1780.526237] ? ns_capable+0xd9/0x100 [ 1780.527005] vfs_get_tree+0x8e/0x2f0 [ 1780.527774] path_mount+0x13ba/0x20a0 [ 1780.528580] ? strncpy_from_user+0x9e/0x460 [ 1780.529469] ? finish_automount+0xa40/0xa40 [ 1780.530356] ? getname_flags.part.0+0x1dd/0x4f0 [ 1780.531338] __x64_sys_mount+0x27e/0x300 [ 1780.532173] ? path_mount+0x20a0/0x20a0 [ 1780.533008] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1780.534084] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1780.535152] do_syscall_64+0x33/0x40 [ 1780.535920] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1780.536983] RIP: 0033:0x7f9c93414b19 [ 1780.537746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1780.541493] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1780.543048] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1780.544515] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1780.545967] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1780.547423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.548883] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:13:59 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f) 03:13:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x600, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:13:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xf000000}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:13:59 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000040)=',\'\\#/*:,/\'\x00', &(0x7f0000000100)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:13:59 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x221922280, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1780.630492] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:13:59 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x206002, 0x2c) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:13:59 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff8c) 03:13:59 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x3}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0xa0302, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e30, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, 0xffffffffffffffff, 0x0, 0x9bbb) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000180)) sendfile(r1, r2, 0x0, 0x6b) 03:13:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x700, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:13:59 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)=0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x38, 0x0, 0x8, 0x70bd28, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x24040001}, 0x80) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getownex(r2, 0x10, &(0x7f0000000580)) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000003c0), 0x4c4080, 0x0) clone3(&(0x7f0000000400)={0x10100800, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x12}, &(0x7f0000000180)=""/211, 0xd3, &(0x7f0000000280)=""/131, &(0x7f0000000380)=[r1, r0, r0], 0x3, {r3}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r4, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) getsockopt$inet_udp_int(r4, 0x11, 0x0, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_udp_int(r2, 0x11, 0x1, &(0x7f0000000640)=0x6, 0x4) [ 1780.790923] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1780.826656] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=10759 comm=syz-executor.4 03:13:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x4c010000}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 1793.730851] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1800.151180] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=10852 comm=syz-executor.4 03:14:18 executing program 0: execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:14:18 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) fallocate(r1, 0x44, 0x1, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:14:18 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x3}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0xa0302, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e30, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, 0xffffffffffffffff, 0x0, 0x9bbb) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000180)) sendfile(r1, r2, 0x0, 0x6b) 03:14:18 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) 03:14:18 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000014c0)={0x18, 0x71, 0x1, {{0x40, 0x2, 0xffffffffffffffff}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0xa1058300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) ptrace(0x11, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/rt6_stats\x00') r1 = fork() ptrace(0x10, r1) ptrace(0x11, r1) syz_open_procfs(r1, &(0x7f00000001c0)='net/rt6_stats\x00') r2 = fork() ptrace(0x10, r2) ptrace$setregset(0x4205, r2, 0x2, &(0x7f0000000040)={0x0}) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r3, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) clone3(&(0x7f0000001440)={0x1000000, &(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300), {0xdb}, &(0x7f0000000380)=""/4096, 0x1000, &(0x7f0000001380)=""/95, &(0x7f0000001400)=[0x0, r1, 0x0], 0x40000000000000f4, {r3}}, 0x58) r4 = request_key(&(0x7f0000001500)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000001540)='\xea\x0f\n\x9b\v:\xbc>CS\x0e]\xf8\x12\x9b\xc8\x04d\xbb\xad\xd8\xcc!P\x0f\x90\x93\xbf\xf6\xf8%c\xd2S\x96kv\xa4D\x8f\f\f\xf4h\xbd;U\x86b\xb4n\xfd\xf7\r)^[=B\x9f\x9enT\xd39\x15\x81S\xda\xddU\xfc3\xfb\xa3\x97\xf8\xb9\xb4\xdc\xa8\xaa\xd7\xe9\xedL\xf8\xe8\x91S\xa9\xf7c\xc5\xb1\xbd /\x96F\xde\a\xbc|pcP0\xd1\x1e\xc6\xc7g2Zw\xa8\x1aS\xbf\x97\x88\x9a\x93\xc9t\x93', r0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:14:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x900, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:14:18 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 37) 03:14:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x8f000000}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 1800.182662] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1800.189880] FAULT_INJECTION: forcing a failure. [ 1800.189880] name failslab, interval 1, probability 0, space 0, times 0 [ 1800.192366] CPU: 0 PID: 10856 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1800.193793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1800.196091] Call Trace: [ 1800.196637] dump_stack+0x107/0x163 [ 1800.197407] should_fail.cold+0x5/0xa [ 1800.198190] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1800.199227] should_failslab+0x5/0x10 [ 1800.200004] kmem_cache_alloc_trace+0x55/0x360 [ 1800.200960] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1800.202007] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1800.203026] __list_lru_init+0x403/0x7e0 [ 1800.204015] alloc_super+0x7f4/0x990 [ 1800.204825] sget+0x10b/0x500 [ 1800.205486] ? kill_litter_super+0xa0/0xa0 [ 1800.206366] ? devpts_remount+0x130/0x130 [ 1800.207318] mount_nodev+0x2e/0x120 [ 1800.208083] ? devpts_kill_sb+0x70/0x70 [ 1800.208953] legacy_get_tree+0x105/0x220 [ 1800.209805] ? ns_capable+0xd9/0x100 [ 1800.210583] vfs_get_tree+0x8e/0x2f0 [ 1800.211349] path_mount+0x13ba/0x20a0 [ 1800.212140] ? strncpy_from_user+0x9e/0x460 [ 1800.213043] ? finish_automount+0xa40/0xa40 [ 1800.213936] ? getname_flags.part.0+0x1dd/0x4f0 [ 1800.214912] __x64_sys_mount+0x27e/0x300 [ 1800.215747] ? path_mount+0x20a0/0x20a0 [ 1800.216572] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1800.217678] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1800.218757] do_syscall_64+0x33/0x40 [ 1800.219536] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1800.220606] RIP: 0033:0x7f9c93414b19 [ 1800.221404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1800.225234] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1800.226820] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1800.228305] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1800.229805] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1800.231290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1800.232781] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:14:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xa64, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:14:19 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffb) 03:14:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x9effffff}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:14:19 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x40, 0x2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x12) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x2, 0x3, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x5}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x400}}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1d}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0xa}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x400}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x1}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x20}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x8}}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x29}}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000834}, 0x2000840) [ 1800.321264] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1814.209405] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:14:40 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x3}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0xa0302, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e30, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, 0xffffffffffffffff, 0x0, 0x9bbb) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000180)) sendfile(r1, r2, 0x0, 0x6b) 03:14:40 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffe) 03:14:40 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 38) 03:14:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xf0ffffff}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:14:40 executing program 3: ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)={0x4, 0x3}) r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='rxrpc_s\x00', r0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:14:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x7c, r2, 0x8, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x65}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x48045}, 0x10) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1821.528431] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:14:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xf00, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:14:40 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x9, 0x7, 0x5, 0x100000001, 0xc48, 0x1000}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {r4}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) r7 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) mq_timedsend(r7, 0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) mq_timedsend(r7, &(0x7f0000001200), 0x0, 0x3, &(0x7f00000012c0)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r11}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP(r7, 0xd0009412, &(0x7f0000000100)={r11, 0x1000}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000200)={r6, r11, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059e00)={0x396b6fc8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x3, "8e349a5d3bfb32"}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:14:40 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) [ 1821.580523] FAULT_INJECTION: forcing a failure. [ 1821.580523] name failslab, interval 1, probability 0, space 0, times 0 [ 1821.583035] CPU: 0 PID: 10913 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1821.584480] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1821.586850] Call Trace: [ 1821.587414] dump_stack+0x107/0x163 [ 1821.588186] should_fail.cold+0x5/0xa [ 1821.588997] ? create_object.isra.0+0x3a/0xa20 [ 1821.589953] should_failslab+0x5/0x10 [ 1821.590736] kmem_cache_alloc+0x5b/0x350 [ 1821.591592] create_object.isra.0+0x3a/0xa20 [ 1821.592504] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1821.593573] kmem_cache_alloc_trace+0x151/0x360 [ 1821.594550] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1821.595569] __list_lru_init+0x403/0x7e0 [ 1821.596424] alloc_super+0x7f4/0x990 [ 1821.597229] sget+0x10b/0x500 [ 1821.597878] ? kill_litter_super+0xa0/0xa0 [ 1821.598756] ? devpts_remount+0x130/0x130 [ 1821.599619] mount_nodev+0x2e/0x120 [ 1821.600386] ? devpts_kill_sb+0x70/0x70 [ 1821.601224] legacy_get_tree+0x105/0x220 [ 1821.602095] ? ns_capable+0xd9/0x100 [ 1821.602876] vfs_get_tree+0x8e/0x2f0 [ 1821.603656] path_mount+0x13ba/0x20a0 [ 1821.604459] ? strncpy_from_user+0x9e/0x460 [ 1821.605387] ? finish_automount+0xa40/0xa40 [ 1821.606295] ? getname_flags.part.0+0x1dd/0x4f0 [ 1821.607291] __x64_sys_mount+0x27e/0x300 [ 1821.608141] ? path_mount+0x20a0/0x20a0 [ 1821.608994] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1821.610091] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1821.611175] do_syscall_64+0x33/0x40 [ 1821.611951] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1821.613030] RIP: 0033:0x7f9c93414b19 [ 1821.613811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1821.617656] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1821.619234] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1821.620711] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1821.622196] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1821.623669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1821.625170] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:14:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x4800, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:14:40 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:14:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xfffff000}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:14:40 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff000) 03:14:40 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x40, 0x2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x12) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x2, 0x3, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x5}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x400}}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1d}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0xa}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x400}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x1}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x20}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x8}}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x29}}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000834}, 0x2000840) [ 1821.708914] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:14:40 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000540)='5', 0x1, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_LIMIT(r3, 0x8030942b, &(0x7f0000000040)={0x3f, {0x37, 0x2, 0x9, 0x7}}) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) add_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 03:14:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xffffff7f}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 1834.685878] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:15:02 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0xc5) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x482800, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000ff010000003e2f66696c653100"]) symlinkat(&(0x7f0000000040)='./file1\x00', r1, &(0x7f00000001c0)='./file1\x00') r2 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) clone3(&(0x7f0000000440)={0x40202400, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), {0x15}, &(0x7f0000000300)=""/137, 0x89, &(0x7f00000003c0)=""/19, &(0x7f0000000400)=[r2, r2], 0x2, {r0}}, 0x58) 03:15:02 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x195) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000780)={'syz_tun\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000000180)=[{{&(0x7f0000005340)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000c00)=[{&(0x7f00000000c0)="863c53142513ecdb27a6ab07930037fea1b95edd0a793e20f16d4bdf58466bfcdeabfaa8fae80ddc04eda5586968093568c97afd96e7a0ba5ad491c36c3ce1cdd6b93e6754850640bc5549a55850a142c2b717ff133f1788e2f6a77b27a2e152e2f9bb44f02bf709a71a95e3846188dd87c8615eeeed290bd7fc6b", 0x7b}, {&(0x7f00000001c0)="750285df52d84f62bd50d36115b28f5d4381a38f2a3b2084d1cbf91d8eb46140fd2ac11963561d29d796e90c463746fe5108a3e6f57ba77d67dae81d0efefc12756faf8a5469e43bc19d4c5601c01d06e8b598f97062c3891e8729e62fa3a57b5d8c4c30c109ce108e0287a8cbfd5daf0dfc5fd350e287849a54b8057e9bec9d5e7c45183e5619f539db85c04c27d1e03a8cd46e128ba62c158874e38913a72d70f72c9163967530217b8331630bda75e49d73c7561a5ae381b287ba14bc176b28e8db339cae1350edff2caa23746a9873355128c2883028956f225759f5fc0169ee6e", 0xe3}, {&(0x7f0000000c40)="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", 0x453}], 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=r4, @ANYBLOB="ac14400000000000000000002800070000000000008d000007000000070f7c000000000000520649d2cec7b099b257bbb0d6fae6debd50098df99037d21ffba273f56c72540000880ab501c873920d8d59a5c3824b72d487d8a1cfae642cc3a5943ed70b8a5d0bcf98f9969c94ff559f9e8cc7febbeffd894325cf964dd0188ffa7ba57983acd6322a5433"], 0x48}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@loopback, @local, @dev={0xfe, 0x80, '\x00', 0x41}, 0x2, 0x1, 0x9, 0x400, 0x4, 0xc0400009, r4}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) recvfrom$unix(r0, &(0x7f0000000200)=""/126, 0x7e, 0x101, &(0x7f0000000180)=@file={0x0, './file1\x00'}, 0x6e) statx(r0, &(0x7f0000000680)='./file1\x00', 0x400, 0x8, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000005c0)='./file1\x00', &(0x7f0000000600), 0x4, &(0x7f00000008c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@loose}, {@fscache}], [{@euid_gt}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@permit_directio}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, '^'}}, {@euid_lt={'euid<', r5}}]}}) execveat(r0, &(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=[&(0x7f0000000380)='(\x00'], &(0x7f0000000580)=[&(0x7f0000000500)='\x00', &(0x7f0000000540)='\xd2^\x00'], 0x1000) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x111801, 0x0) pidfd_getfd(r0, r6, 0x0) 03:15:02 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x40, 0x2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x12) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x2, 0x3, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x5}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x400}}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1d}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0xa}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x400}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x1}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x20}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x8}}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x29}}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000834}, 0x2000840) 03:15:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xffffff9e}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:15:02 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x4b01, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:15:02 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 03:15:02 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 39) 03:15:02 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "9b43e97f581ca0629208b04c6665553eae9f89b464805e9f3cc179b15fbafdc47ccf1d0585576239bc3dca228e200e31a62e858eb5d28033b0906a8697e83830", 0x35}, 0x48, r2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = add_key(&(0x7f0000000480)='trusted\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000580)="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", 0x1000, 0xfffffffffffffffb) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', r4) [ 1843.296343] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:15:02 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @auto=[0x64, 0x38, 0x35, 0x62, 0x34, 0x65, 0x34, 0x33, 0x34, 0x31, 0x35, 0x5, 0x1b, 0x36, 0x30, 0x66]}, &(0x7f00000002c0)={0x0, "154ab62f4cce7161b3a7f32b37d27591a1eb26099184be3d6d01c707060d21acbad6e808e38efb580d6aad77281c0e7b065547d45610816a89d550b02e0747d8", 0x16}, 0x48, r0) r2 = add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000380)="953a033349e15871996c7c9f1aeff03b74f45bd873bcdb4bc1c6fae7aa9ddb30d70fd2fe6fe962135bec669cf41c874027ad490acaf83769c803ce3a66c868ed12eeafa36da33e46edfefc6e3a794fa9c8fcabee6f269a00ac8950b2cd16671b99c659a6e2d7e696264acc8978819cacef0eb4c64777e0c4942cd723d8933f38deefefaa0688475db522e041f117f6b6d61102aab400c057d8c80599bed486224e7dc2f87b9b9ad7c9e903b0beb4cfa0", 0xb0, r1) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x40040) dup(r3) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x0, 0x0, 0x3}, 0x5}}, 0x18) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = request_key(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)='/dev/snd/seq\x00', r2) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, r4) [ 1843.319885] FAULT_INJECTION: forcing a failure. [ 1843.319885] name failslab, interval 1, probability 0, space 0, times 0 [ 1843.322284] CPU: 0 PID: 11079 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1843.323722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1843.326093] Call Trace: [ 1843.326645] dump_stack+0x107/0x163 [ 1843.327434] should_fail.cold+0x5/0xa [ 1843.328237] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1843.329307] should_failslab+0x5/0x10 [ 1843.330091] kmem_cache_alloc_trace+0x55/0x360 [ 1843.331053] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1843.332114] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1843.333156] __list_lru_init+0x403/0x7e0 [ 1843.334051] alloc_super+0x7f4/0x990 [ 1843.334856] sget+0x10b/0x500 [ 1843.335529] ? kill_litter_super+0xa0/0xa0 [ 1843.336412] ? devpts_remount+0x130/0x130 [ 1843.337317] mount_nodev+0x2e/0x120 03:15:02 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x40, 0x2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x12) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x2, 0x3, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x5}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x400}}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1d}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0xa}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x400}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x1}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x20}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x8}}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x29}}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000834}, 0x2000840) [ 1843.338074] ? devpts_kill_sb+0x70/0x70 [ 1843.339009] legacy_get_tree+0x105/0x220 [ 1843.339852] ? ns_capable+0xd9/0x100 [ 1843.340627] vfs_get_tree+0x8e/0x2f0 [ 1843.341426] path_mount+0x13ba/0x20a0 [ 1843.342224] ? strncpy_from_user+0x9e/0x460 [ 1843.343119] ? finish_automount+0xa40/0xa40 [ 1843.344010] ? getname_flags.part.0+0x1dd/0x4f0 [ 1843.344998] __x64_sys_mount+0x27e/0x300 [ 1843.345849] ? path_mount+0x20a0/0x20a0 [ 1843.346679] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1843.347788] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1843.348892] do_syscall_64+0x33/0x40 [ 1843.349684] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1843.350765] RIP: 0033:0x7f9c93414b19 [ 1843.351552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1843.355429] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1843.357035] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1843.358540] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1843.360045] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1843.361560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1843.363059] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:15:02 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 03:15:02 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x4c00, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:15:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xfffffff0}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 1843.471158] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:15:02 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x40, 0x2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x12) pipe(&(0x7f0000000180)) [ 1843.500208] audit: type=1400 audit(1655608502.343:11): avc: denied { checkpoint_restore } for pid=11078 comm="syz-executor.7" capability=40 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 03:15:02 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:15:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0xffffffff}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:15:02 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:15:02 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) [ 1855.448784] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:15:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:15:22 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x40, 0x2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x12) 03:15:22 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 03:15:22 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000540)='5', 0x1, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r1) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="5e30c0d2f886d1ba25556f8e74f8a5e38e677d93539cf15f705d69f4efed", 0x1e, r2) request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='asymmetric\x00', r1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:15:22 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 40) 03:15:22 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x640a, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:15:22 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl(r0, 0x8, &(0x7f0000000180)="2d76ef81131a4989a1a04143b8c51448e826cf7ea77766a57abf3ba9b525581937f8f4c722d5d74a1fd7387029199a92b3072c72dffc45f20a0f5baafc8d88d7cdad7c6a5a1bf304cc660ef47694bd5904dda1512a534a5d7a7ce55a81351c9b4514ef56aaf9f55fbdc4f1a432ff7b236871bbb4820d4b2800f5073cf18742093b80c77b99b8899a") r1 = signalfd(r0, &(0x7f0000000040)={[0x8000]}, 0x8) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:15:22 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000bc0)=0x7fff, 0x4) sendfile(r2, r1, 0x0, 0x9bbb) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240), 0x2, 0x0) pidfd_getfd(r1, r3, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0xe1, 0x7f, 0x5, 0x7f, 0x0, 0x3, 0x2, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0x9}, 0x4000, 0x20, 0x6, 0x1, 0x0, 0x2, 0xfff, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) r5 = syz_open_procfs$namespace(r0, &(0x7f0000000200)='ns/uts\x00') close_range(r5, r4, 0x2) r6 = syz_open_procfs(r0, &(0x7f0000000180)='net/rpc\x00') clock_gettime(0x0, &(0x7f0000001440)={0x0, 0x0}) recvmmsg$unix(r6, &(0x7f0000001300)=[{{&(0x7f0000000280)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/136, 0x88}, {&(0x7f0000000500)=""/223, 0xdf}], 0x2, &(0x7f00000014c0)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1a00cd6314882f720001000000000000000000005291e1c17c6cf74fceffb24b7bb88839199af8583790e605d21c0cb56398833ab97888c3077ac774ccc3d05dd56c246a7335f93ca15df865496eaeb4710659da5d4ce48f4c98178462bffd43f530579a78e8de5db597554d3b74c686d31e35d478321cf2f23e6d1ae3899dd9872898de4840bbe175", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x60}}, {{&(0x7f0000000680), 0x6e, &(0x7f0000000800)=[{&(0x7f0000000700)=""/193, 0xc1}], 0x1, &(0x7f0000000840)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000000880), 0x6e, &(0x7f0000000cc0)=[{&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000000980)=""/144, 0x90}, {&(0x7f0000000a40)=""/123, 0x7b}, {&(0x7f0000000ac0)=""/215, 0xd7}, {&(0x7f0000000bc0)}, {&(0x7f0000000c00)=""/161, 0xa1}], 0x6, &(0x7f0000000d40)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/213, 0xd5}], 0x1, &(0x7f0000000fc0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001040)=""/210, 0xd2}], 0x1, &(0x7f0000001180)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x148}}], 0x5, 0x10121, &(0x7f0000001480)={r7, r8+10000000}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r9, 0xc018937e, &(0x7f0000000600)=ANY=[@ANYBLOB="010083b316db061bb9d222c9c625b71afd1541ddca196c8b770100000018000000", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1864.149152] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1864.154435] FAULT_INJECTION: forcing a failure. [ 1864.154435] name failslab, interval 1, probability 0, space 0, times 0 03:15:23 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x40, 0x2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x12) [ 1864.156797] CPU: 0 PID: 11241 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1864.158542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1864.161172] Call Trace: [ 1864.161807] dump_stack+0x107/0x163 [ 1864.162669] should_fail.cold+0x5/0xa [ 1864.163564] ? create_object.isra.0+0x3a/0xa20 [ 1864.164634] should_failslab+0x5/0x10 [ 1864.165523] kmem_cache_alloc+0x5b/0x350 [ 1864.166483] ? mark_held_locks+0x9e/0xe0 [ 1864.167444] create_object.isra.0+0x3a/0xa20 [ 1864.168472] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1864.169681] kmem_cache_alloc_trace+0x151/0x360 [ 1864.170779] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1864.171943] __list_lru_init+0x403/0x7e0 [ 1864.172910] alloc_super+0x7f4/0x990 [ 1864.173834] sget+0x10b/0x500 [ 1864.174568] ? kill_litter_super+0xa0/0xa0 [ 1864.175555] ? devpts_remount+0x130/0x130 [ 1864.176526] mount_nodev+0x2e/0x120 [ 1864.177381] ? devpts_kill_sb+0x70/0x70 [ 1864.178323] legacy_get_tree+0x105/0x220 [ 1864.179274] ? ns_capable+0xd9/0x100 [ 1864.180145] vfs_get_tree+0x8e/0x2f0 [ 1864.181025] path_mount+0x13ba/0x20a0 [ 1864.181927] ? strncpy_from_user+0x9e/0x460 [ 1864.182932] ? finish_automount+0xa40/0xa40 [ 1864.183930] ? getname_flags.part.0+0x1dd/0x4f0 [ 1864.185039] __x64_sys_mount+0x27e/0x300 [ 1864.185987] ? path_mount+0x20a0/0x20a0 [ 1864.186916] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1864.188124] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1864.189325] do_syscall_64+0x33/0x40 [ 1864.190202] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1864.191393] RIP: 0033:0x7f9c93414b19 03:15:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x0, 0x2}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:15:23 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x40, 0x2) socket$netlink(0x10, 0x3, 0x12) [ 1864.192252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1864.196539] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1864.198296] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1864.199944] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1864.201583] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1864.203221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1864.204853] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:15:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x0, 0xf}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:15:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x6800, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:15:23 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000180)={0x0, @aes256, 0x0, @desc3}) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x8, 0x2000) openat$cgroup_int(r1, &(0x7f0000000100)='cpu.max.burst\x00', 0x2, 0x0) 03:15:23 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 03:15:23 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file1\x00'}) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) execveat(r1, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000) 03:15:23 executing program 0: clone3(&(0x7f0000000040)={0x206204200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1864.335208] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:15:23 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000000000) 03:15:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x6c00, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:15:23 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x2}, 0xc02}}, 0x18) close(0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "198be94fbb35c897dcf37f04ebd4f9f4ecd9bf010e61f00f837f8e57242cba52965f202765246dad807ffa6de0379fed4c517d5e92f64077beb89fbb4c6a4ca9", 0x3f}, 0x48, r2) r3 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000200)="b3accb1f09c87c3d9cb769df0cd9251e", 0x10, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r5}) keyctl$KEYCTL_MOVE(0x1e, r3, 0xfffffffffffffffc, r4, 0x0) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000380)="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", 0xfd, r4) clone3(&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, {0x3f}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(&(0x7f0000000040)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000500)='cpu.pressure\x00', 0x2, 0x0) [ 1864.431837] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1876.328562] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1883.690785] nfs4: Unknown parameter 'fsuuid' 03:15:42 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x410000, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x4) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x4000000, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:15:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private, 0x0, 0x8f}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:15:42 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000c00)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x4dcd, &(0x7f0000000100)={0x0, 0xe3dd, 0x10, 0x0, 0x215}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000040), &(0x7f0000000dc0)=0x0) io_uring_enter(r1, 0x6b3a, 0xe02f, 0x2, &(0x7f0000000c40)={[0x6]}, 0x8) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000440), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/205, 0xcd}, {&(0x7f00000005c0)=""/229, 0xe5}, {&(0x7f00000006c0)=""/18, 0x12}, {&(0x7f0000000700)=""/208, 0xd0}, {&(0x7f0000000e00)=""/185, 0xb9}], 0x5, &(0x7f0000000940)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x118}, 0x40000000) r6 = fork() ptrace(0x10, r6) ptrace(0x11, r6) syz_open_procfs(r6, &(0x7f00000001c0)='net/rt6_stats\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0)={0x0}, &(0x7f0000000b00)=0xc) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000c80), 0x2000, 0x0) ioctl$FITRIM(r8, 0xc0185879, &(0x7f0000000cc0)={0x200000000000000, 0x0, 0x6}) clone3(&(0x7f0000000b80)={0x22a0b0200, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), {0x40}, &(0x7f0000000300)=""/39, 0x27, &(0x7f0000000340)=""/240, &(0x7f0000000b40)=[r0, r4, r6, r7, 0x0], 0x5}, 0x58) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000d00)={0x0}, &(0x7f0000000d40)=0xc) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000ec0)=ANY=[@ANYBLOB="2100020002010000000100861ae67619932c760f3a488efbc5a419dbb255d58332c59650220a2ae7a25964adff893db37a3c5433acbbe8db1e91893097cb32063711a27bc96fc0c2ab9b65190b4925816fe4013cfaa6d92ca05b2dd66e5f9cf9ad85c5f9f4cd4ec913c5063874535a831f100ba9ba5eefa992c2825358a7f1b28c1c2b4fa390977ebb098564ce5654ce800e8530e90ec8fb54509844abb56ec3784ed867d481f86ba41db7d4bdd2624816f912cf64c103c851308fb7682d12e437c2983886822bb708b384ac0d56ab3f76a6a8f9b4e15a765021d02e71cd950e9d8566658435417f5e4a228c3da8d0edb3d53ce91ee03f874addd672036f9f6f52df718d", @ANYRES32=r9, @ANYBLOB="0300242328"], 0x21) syz_io_uring_submit(0x0, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)='./file1\x00', 0x140, 0x492800, 0x23456, {0x0, r3}}, 0x6) 03:15:42 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x40, 0x2) socket$netlink(0x10, 0x3, 0x12) 03:15:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x7400, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:15:42 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 41) 03:15:42 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000001580)) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000180)='./file1\x00', 0x7, 0x4, &(0x7f0000000340)=[{&(0x7f00000001c0)="20f4cb4ff5966144ddae2acfb0aef0b1066fbe08f30d0744cb1dd725ad4274ea9215ddded1467c103c8d1dc02626c69bfd71cd8ee3c84f363d09dd8d6208e3d086b8aa396b4d80198b6e08a681ef6a390d8a9ea68659cb0d6303f51ead896775addfeda9766c35bfcc04e4c217b3979cd10c02e32ab311604418dac785fa62d7f09d4b19d16b564bc43d0ef0be184c177ee1c79e458c196b2fb3465c02761679121694d781cf0f3acb883f2fca9289aff08434d7d858758d", 0xb8, 0xfffffffffffffff7}, {&(0x7f0000000280)="2f0c603dfd1c16", 0x7, 0x2}, {&(0x7f00000002c0)="52c49f8e88ecaef46ccb2eedbf1fe8b7e12e8a8302347d0100ee657fe3a71cff15887d636797649b67ff721631654cafb99aaf8c09", 0x35, 0x9}, {&(0x7f0000001500)="39af50036d8ad575edfe836b49206e1951ea769cc2", 0x15, 0x200000004}], 0x80, &(0x7f00000015c0)={[], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0x1800fed0259e6249, 0x32, 0x34, 0x65, 0x30, 0x64, 0x55], 0x2d, [0x66, 0x30, 0x35, 0x62], 0x2d, [0x31, 0x35, 0x33, 0x34], 0x2d, [0x7, 0x32, 0x37, 0x65], 0x2d, [0x30, 0x64, 0x35, 0x63, 0x33, 0x64, 0x63, 0x31]}}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '-{'}}, {@pcr={'pcr', 0x3d, 0x22}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&/@+)\\!{~*,'}}, {@smackfshat={'smackfshat', 0x3d, ',+'}}]}) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x800) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000001440)={&(0x7f0000000440)=""/4096, 0x1000, 0x8, 0x1ff}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000001480)={{0x1, 0x1, 0x18, r0, {0x20}}, './file1\x00'}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000014c0)={0x0, 0x7}, 0x4) 03:15:42 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) [ 1883.727203] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1883.746144] FAULT_INJECTION: forcing a failure. [ 1883.746144] name failslab, interval 1, probability 0, space 0, times 0 [ 1883.748585] CPU: 1 PID: 11432 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1883.750027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1883.752357] Call Trace: [ 1883.752905] dump_stack+0x107/0x163 [ 1883.753660] should_fail.cold+0x5/0xa [ 1883.754471] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1883.755541] should_failslab+0x5/0x10 [ 1883.756323] kmem_cache_alloc_trace+0x55/0x360 [ 1883.757260] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1883.758319] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1883.759332] __list_lru_init+0x403/0x7e0 [ 1883.760174] alloc_super+0x7f4/0x990 [ 1883.760941] sget+0x10b/0x500 [ 1883.761580] ? kill_litter_super+0xa0/0xa0 [ 1883.762447] ? devpts_remount+0x130/0x130 [ 1883.763292] mount_nodev+0x2e/0x120 [ 1883.764032] ? devpts_kill_sb+0x70/0x70 [ 1883.764856] legacy_get_tree+0x105/0x220 [ 1883.765688] ? ns_capable+0xd9/0x100 [ 1883.766478] vfs_get_tree+0x8e/0x2f0 [ 1883.767249] path_mount+0x13ba/0x20a0 [ 1883.768036] ? strncpy_from_user+0x9e/0x460 [ 1883.768921] ? finish_automount+0xa40/0xa40 [ 1883.769810] ? getname_flags.part.0+0x1dd/0x4f0 [ 1883.770784] __x64_sys_mount+0x27e/0x300 [ 1883.771616] ? path_mount+0x20a0/0x20a0 [ 1883.772433] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1883.773505] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1883.774572] do_syscall_64+0x33/0x40 [ 1883.775334] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1883.776382] RIP: 0033:0x7f9c93414b19 [ 1883.777144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1883.780930] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1883.782498] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1883.783960] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1883.785418] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1883.786893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1883.788356] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:15:56 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) 03:15:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1={0xfc, 0x0}, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:15:56 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') r2 = signalfd4(r1, &(0x7f0000001600)={[0x3]}, 0x8, 0x80800) mount$9p_fd(0x0, &(0x7f0000001580)='./file1/file0\x00', &(0x7f00000015c0), 0x1908081, &(0x7f0000001640)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}], [{@obj_type}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r3 = syz_mount_image$iso9660(&(0x7f0000000100), &(0x7f0000000140)='./file1/file0\x00', 0x4, 0x7, &(0x7f0000001400)=[{&(0x7f0000000180)="e97b57570602", 0x6, 0x10000}, {&(0x7f00000001c0)="7af3bd3536c87a2adb06718cf0489f7642a5fa4c6cdc83ec77747fe72969989b1e88cc81cd", 0x25, 0x6}, {&(0x7f0000000200)="c7e4707f8612b9a362", 0x9, 0x8}, {&(0x7f0000000240)='js', 0x2, 0xae}, {&(0x7f0000000280)="acfe6d80c598ae640a0e74f52510c3371ceeb85cb2e96fef9835c1add6f32ddc32a4e7149dd368659ce3090c471cca7aeed0b656c3f8c9052f3a0f682fa9b0b5970de73a6d152fa9e5e666a5018cd534fab8e8", 0x53, 0xa5e}, {&(0x7f0000000300)="cd6cec0c6181aabb776aab4d9a33133f5361fe63b54c45d52ed315e8c9c39f7d2f4a6edd9d4fe4291039b5786c7aead1551eee7e351448be96387000c65a54db171a600e49648178b58dda4ce78e6dc20c3365048fb2df5419237d65f6381a33d81354fff819dfa7f9a16a0720000da4ac4f5ca6a1eb41b91aec0d448f1e584f21f00e4882c7968911110cf2ffcb8856be804aed9c50f9c8f2a203e909b7aa84d668a647e00ac369c22d1fb1d532ad0b62b46c38ad3a68269ec54fc038e4e354c10a70bde2e7ad2900b383b59f6e360031774cec3e4ea273897dfa271e3661b439cf0c41595cd282129c599dadf619ed94770609668ef5c09dff3e71e03bb73d45388aa2bd303738fbf09de5193486aecd8a3e4e54787abd8bdb2caf15ec63a3f7bc8f1148ec0fde0db455419fd27624293ca1191c13f68d23c41b0feebc9cbaffc6ec838dd399af241b6eb17f24a4776755c330fbfd3abe62d46e1ad3316b433510a30474e19250e1ffe4b3c017b0f11d4ea284213bd1e0441610914c65576be363c0d98353328c2108b2fe31ea18887dce52c7440a96182787ab9c15a4ad417e1001c25a04bf23b4b3de0ad3840e018ad9a81e94d55e498653539aa59368e4d4dddf483e1fc6596e3e3b91663330503045f7e83161ced793994fa23e6bef03d0e1bf69394b586958f9fc803ad7dac4226e0e9b3c535f3df6280c72406f324cebe7230577e6538e6f020a4ce6d561c8007c55785a19e321a8eb89d3a7c60b7adcaabde23569164e25f0780fb82234806d72aa5fc79fb008a713e4905107021fd4ded4ae0057800cbccca9027693be289033c0a46bed67b5cb11c9fe1b771d71e3546125b1a6b8b1290d21094de671bea533745851b9b7c123f7e8ae776094df3c8b2b40d40665e119f98e7c0c3636ac8ad1e2f6edcc11c9c49108785886c52fa3dddc9c2bc6834ca602d3922a8366ba75e31490753958d8463219d443edb8e615dfd8a037747d58eaf05a749bb23714343084803480d8e1467b82cbafbe8252403e8d79afc7eae0e89f8b4e6ec6c1ae841acf5bb932144a0c5ce30638e45cb02dc9b6efa6ffbc216a16d9e1a5ee7b9501571fd13fe00cf253bec24230c92a22d2713938600743e3d52ba02842ddc73cf12897fc31d7dda0cb1f17964619d66d5079b304bc9a21c3a401b191876af59696dbe83a3df6181e0bfb3e8a3e2ed103611bd67ed5a32663a669f6e333a226ebfc21a2b69e2c63438d55bc37f5b089687a3445bc456197c47679398780ed84bd1bdea54853cb9388a535097c39a8f1367376556fc9867b36e43342879cfdfd2d85660ed7996684e520151da7c495c79bca18e8887207893ad82be6daebf3dfd535b863fadc0854c16efa82a7d9f21e1b78f40a08d4660cf9e9f87ab4b5c84700209206d28446e01267933ba1f21b0840be85dc29607955c9fdea66b68b46e6e689d5e74ac405494275bdb07e740dd24f73e09f5ef006397a308e50287661195a67ca596b9a2eded67c24cdde9432e1971eb191d0478941359ac8a0526e20def9dc5e15f0571bd718ebb073f101bab7e07dbae0602190848720154724609ff6d180b6943198b8c4ce4f2f3d9eaa3f1c0295ba04d820b47a8833056474592931f7da25940c5cf6693ed85a0a8b8f820d599cf08da6a0d4d750544f388010f7d18169341bc15d313c4747ae325effba6fe181e68cc07d5217aef2411e6a8e36546dcf3e713a4229c9ad32c0d95d3a7fd21c6161f8380041ea6ebafc778edd0f9fa9ed5aebf8d4e630d18bf170d23a7bf8eaddfc2f3298079286153b25662559d57d24d3165162b9519cfb17bea9a4432dfbc562761fbe415d3333d0314b31ac21067ff761d4dec9e77ff6b25900e7f8b45a99f5430933840ec77508723ba556e066b1ed0d4a035cd34d927dced836cad00bc2924dbbef143d412ec59218df7c4fb8389d8c20412d83d845e35878ee8ac1c943baeff438db9b99faef587f7c717b0e2a2db636affd5446a74b9cab8e2f9781708e2a50a67eb90e4089eb91f58418a335852aca9cb8f2e24b92d976aee1fb329d40b3f0648494e2b13e92650025a56b03239d2aede196a403ae79141b189ecfa114fbb79bdaee3f276b48594abf3deefa06a94c0393ca8fa3c479b036ce45122042cab47f501c1504ce790ccf38a87d51ecd4c9981cecb39b32e3e9fcecf5a0960c5c8859ebf32ac7e1f1aa9c831863b3295c53281203cc2eb5770a3e50c899fb89ff353aebc2d17770660fc82ef8d4eda0c7c74f1397765ab1a96457ae969fec8e176dc35925d138f834591e1db05ae1aadd12c13856b3ffde440626b1cbc399d8fc7c267ba8b366960bceda08e528939d25892317b218bdc7ceedb15e099abfbbfdfebff133ee0e479d0acb6c2973df867e816c7d96a5beb47aed4bad65965e15e64b5a213f12f893b73915a4b37be932714ba82853e311eedc3da41d273b2508fbbddf6869c9aa6823d23e4c0f79f5362157ae0519c69932f6d7dc5718dade87ad4920dae41fdedb4489a8074faf463b0328e5bb9863c4362c78c63f192a64ddad521cb0cbdff5ba9d71205059c4de08479fb2229925eba13f2b296fa079c4ac625c951281bdc9a543541addf9b6f4e682d41b6bbc4dc3e843a18ac018d6d11cd25fcfe29aadb27f18cebe2c2bba7202e0792715f521e8f7a1d89c4c1876bc58c99c531f6c8a84312a75b347b84bbbfaacdb450dfb9e66c096f3c78e627e1ed7a6580e32de28203003744391c4ba88cc05015a933ec56cdd1fd4d49c78eb062c426e95aabfc56a51cd59699b659d34ea352779ddfa85f6510ca6c4d76ef635d827aa2744c24dd36a6e59af202b5168dc3eabbb33ae10144613b202d5ce80081f86c8d66713594f85c4ec5cf5fb4d5f09514a0112bd2fb2b852f26aa33aedeff92b68ac7a9d49a1569c2c9e6caa1c4e01089a33b254ce8e6ecfb88abf20fbd9d9c0e379a062c19134fb89ea675d9a806df865f05fa2248142567a2260f01af9be9b01253781c01b3cf413d9333d6ac3a5e66a7cbc9536df966914bbb3cdc2c7cf8a3a651a40bd03d9a13e5cb5afcca019abf2af56eb9b3ffc3c69c67be1b3d5ba2fe7c608de730fcdd05e22c0634f1ee59ff66ca5a939d9ca955a22da31b0499f3ac95b7f6477bea0373ef185f65a96e33e03a7ec5ebfa3ae57f30b355ffe7531675ba22291611b0220e6aea90001935b614ac2d95c8015a2571fb7b8bbeb0d66dafe9cef22bd58b251df1f2b49ad0687a0f3456c0cd20dca721099c18c5a634655ac6b4125b6c369f268971d1e23206145d391005eaf387e944049c5a7d0254abfe7029c7bff37b1410e0599381531fb316ee89267fbf3870bd7e103413c222db71840d47e8100c6ccfe82720f3755fde680bcbd9a45f748b5bb52f35ea14770f8021a479b8af17d0789651578abcb0f6e3d5dfe402b5e4204caaefc2f7479027540043014b54083505647c031d59a578f4b528256a25b526e5b1e3b97346cf1446ed906535bb9f29853874e94a4b32a1861de51a14d6e6078d48b0afcb3b25f7f92221476e2f0ce240b3bc4801af9210cad699ec0f721b1f5e77411281ed83ab36f7da0017db019179bb17c7343b813683491dbb48f9a7786267b97174fd948f6369e05317723db24dbacff5ec144996ece8a66c71b08cf10b63f051454fb470b6c17534d3119a6d74361751710ac63f57b1bb1ad90464b6343e4d3194134b8c307d6fbebb680b87467cddd50a1457377b92bfe04303953b837a1bc60ff30806593fa59063c9c93745427fd10aca34f0a2bb46f1529f9c0359148851152858bf2e7debfc0d26059cbef320b97b0e1716866a0a65596f797fe73b637da2b943558b482d34372de5066488f5ca55ada525cc02a6f3d33f12306540754115c733e647e7c1e0ea4260f9ed5893bd69dcc5d512ee90eafb6de2c38ea871c7855d52808d2b64811d0c4f21017a8d76147037730201526dadb4746733a75e22dbce3f2dcc3b4f653722fd2b678ac71f1ad33184b9d23fcc4d5257bce2f100bfed4f2acf511f01bc7e21d28b5bf603f06a7af5c92cd4674d463d471c68ffb1d6124778661926a3e6f0543972a826f2d811fc9d5ac0974e3cdf981f3c80e285937b4e79a20e3fb51b5c89a2bbb4f55c0e080607654f69359093fba30d4be19cfcd35f663360dc8306f4ddb3acf3b2b819a434db7fada7a45bab35a6b31adf27348b9dd998aa93a1f27555cc49580e6c66e2f287bb614711d193bba940bb83cedfdeccad2547707c6f92eb0f9ad6c697f00dc6be27bc17dbd4a6de62bda4dd1b8af4fa0429e565efec3f0392f837faab9f212ac64735b550cea6c23334d2e533f0ccd3847e60926688193cde099fb880a86e0e6fc54ba145544c1d2a8a64182a825a30db2aa6db29adeb5a4498609f49125f7f5ff595fafb113e99413102ad1885edfe163cc0f6e47f1847ceb0c770b6e601937dfbbf36e1fcd0a7dc9bea51a877d5a67c00c4a0ea65af1d4a5cf740d871a7b4e5569aa49c26cbd97abe2fa556914dbc76be36c49e18a22e59273363430e07a98ecdf51bf76c0b5983f7eb30e44c3cefb11bfd0d666fc3b6bced3fe8a43148d2d5552b5a73f5061a815fb373d47c59fb08d0eb16e785ab5ce2fe833b64c99a13cd5fe08e61deff3efe58bf5f17ad186675eca59803d8faac7b21a0c59696891c108a83efdb394bb8737a33ab684e486480518f62f997ec9bc897bdc8af89ae62094081178649b73b6d434a1509966fa1e4b7ad0d923f96ad1717d2f7c5846f1015fe0947c6150bde2dc340d266ce6fa1ffed20fa7c082d8dba42bb80232d061571283e135482238cbf025825a382b440b13a36feac192fddc34426a170c35b073b35e2f47d37c806ca3d5e07f0b5b0d2843665ac611a48ae54d6a423a5c11c4385a3929e01e445f94ab216f5395555701fa7f4a8f2e7c044dc3c2ede18f648da4a81a33b3a45f7d2f34dcfc58c1f7fc284d394e075c07eb8c636451f71dc726150583a20a77b714e5a3ee02038481900573e3c638566acb2dbe20b6778cbd1f3d6239449f3bf1e916f85f0c80a122462a4bb1e35d2509f07f1db88a0024b40c01fe1a8a1449d4395ec842b8c988e565b8740b0fd772924b6d63409d205076d2dc990cf78d2490df96abbe4fe82ca8e634a0b63f923f5189ed655cdec6187f935e935a271c922ca50b29d37ef80f0008a93e1caa49b7dcf01865ebae8ce11912405fceb7c52e8265a58276c4133db042631e2010c9268820caf2acc971a402510c81a2160cd9fa399ef6783bca993bf2270569a770d2a3c14ba1232dddb4ae8c37bdeeed695d39f9ce0b69dc755eeacb4db0f329da0e953422fea8ea83723d455292f78310731a9f966e5ebaba0cf98f92f871cd83949a9da759d92233e3fe1a7de4c5a33cf90c030aab712ffb3b5bb930fc320faa9b765db8eaf7ea50952e4f9c7d015923ae86b2067b54f5d1c6c3659910af89026efea26847fbf904632a223bb77df22cc6658231f8593218f2d7dd31a7f38c341dcf5892b0b817b851bd69efdcdfb3f326fad9c1909f1263aa9fc799778a8ac09b5be92f87055d7793f5209db14f940ee52b92c54d063c48f3dc375dbb30a8dbbe9954d723b2f31d592fb1a243b29c711ae36afdfe00d235589e224fdf914ad68eb1d6dec9ae7b6e9bfa9305aae69ff0930b6eb171237e6609f8baa0da2cd9affc5a152e107680e9aa0f5e7eabdf3afc568e01d7f7de27f5df8065", 0x1000, 0x2}, {&(0x7f0000001300)="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", 0xfe, 0xca}], 0x8000, &(0x7f00000014c0)={[{@mode={'mode', 0x3d, 0x8}}], [{@appraise}, {@obj_user={'obj_user', 0x3d, '@'}}, {@obj_user={'obj_user', 0x3d, '/*}%@$*}+'}}, {@seclabel}, {@seclabel}]}) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000001540)={{r3}, 0x7a30, 0x347e, 0x3f}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet(r4, &(0x7f0000001bc0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x9bbb) write$binfmt_elf64(r4, &(0x7f00000016c0)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x2, 0x4, 0x8, 0x1, 0x3, 0x3e, 0xffff8001, 0x102, 0x40, 0x29e, 0x4, 0x2, 0x38, 0x2, 0xab9, 0xffe1, 0xfff}, [{0x60000000, 0x6, 0xffffffff, 0x3, 0x9, 0x7ff, 0x7fffffff, 0xbec}], "fde92e9e9433698602bed1a04fd304b7163e51a50757ef62dbbbea8f64361d735fb54fdf1682d89d67e426e05ce55851f675ce3e678ea4d90b37b02fee50439c582c0305dfe345eed781ad6ed9f74bd738e06c8ba7791a2647e157c9ad20d2467097d5e17e17bf3099f56909044868e2db3fd8f59faa3aeab638cfd0a9406efed701bdc54cc33a", ['\x00', '\x00', '\x00', '\x00']}, 0x4ff) 03:15:56 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x4) 03:15:56 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x2}}, './file1\x00'}) clone3(&(0x7f0000000080)={0xcb040b00, 0x0, 0x0, 0x0, {0x18}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe44, {r1}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:15:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x7a00, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:15:56 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 42) 03:15:56 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x40, 0x2) socket$netlink(0x10, 0x3, 0x12) [ 1897.826083] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1897.828115] FAULT_INJECTION: forcing a failure. [ 1897.828115] name failslab, interval 1, probability 0, space 0, times 0 [ 1897.829821] CPU: 1 PID: 11560 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1897.830835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1897.832454] Call Trace: [ 1897.832840] dump_stack+0x107/0x163 [ 1897.833363] should_fail.cold+0x5/0xa [ 1897.833911] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1897.834669] should_failslab+0x5/0x10 [ 1897.835215] kmem_cache_alloc_trace+0x55/0x360 [ 1897.835867] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1897.836596] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1897.837262] __list_lru_init+0x403/0x7e0 [ 1897.837842] alloc_super+0x7f4/0x990 [ 1897.838358] sget+0x10b/0x500 [ 1897.838793] ? kill_litter_super+0xa0/0xa0 [ 1897.839387] ? devpts_remount+0x130/0x130 [ 1897.839966] mount_nodev+0x2e/0x120 [ 1897.840466] ? devpts_kill_sb+0x70/0x70 [ 1897.841008] legacy_get_tree+0x105/0x220 [ 1897.841565] ? ns_capable+0xd9/0x100 [ 1897.842102] vfs_get_tree+0x8e/0x2f0 [ 1897.842615] path_mount+0x13ba/0x20a0 [ 1897.843147] ? strncpy_from_user+0x9e/0x460 [ 1897.843735] ? finish_automount+0xa40/0xa40 [ 1897.844329] ? getname_flags.part.0+0x1dd/0x4f0 [ 1897.844987] __x64_sys_mount+0x27e/0x300 [ 1897.845548] ? path_mount+0x20a0/0x20a0 [ 1897.846111] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1897.846831] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1897.847537] do_syscall_64+0x33/0x40 [ 1897.848045] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1897.848747] RIP: 0033:0x7f9c93414b19 [ 1897.849253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1897.851769] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1897.852807] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1897.853781] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1897.854771] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1897.855740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1897.856713] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:15:56 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 43) 03:15:56 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000180)="ec408335fe9271d134fbf0af26770282142f82a13e6c2a0c", 0x18, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:15:56 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x301000, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:15:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1={0xfc, 0x8}, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:15:56 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x12) 03:15:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xf000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 1897.983135] FAULT_INJECTION: forcing a failure. [ 1897.983135] name failslab, interval 1, probability 0, space 0, times 0 [ 1897.984776] CPU: 1 PID: 11630 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1897.985871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1897.987658] Call Trace: [ 1897.988079] dump_stack+0x107/0x163 [ 1897.988652] should_fail.cold+0x5/0xa [ 1897.989252] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1897.990062] should_failslab+0x5/0x10 [ 1897.990666] kmem_cache_alloc_trace+0x55/0x360 [ 1897.991385] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1897.992192] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1897.992968] __list_lru_init+0x403/0x7e0 [ 1897.993620] alloc_super+0x7f4/0x990 [ 1897.994239] sget+0x10b/0x500 [ 1897.994737] ? kill_litter_super+0xa0/0xa0 [ 1897.995404] ? devpts_remount+0x130/0x130 [ 1897.996064] mount_nodev+0x2e/0x120 [ 1897.996634] ? devpts_kill_sb+0x70/0x70 [ 1897.997259] legacy_get_tree+0x105/0x220 [ 1897.997898] ? ns_capable+0xd9/0x100 [ 1897.998498] vfs_get_tree+0x8e/0x2f0 [ 1897.999081] path_mount+0x13ba/0x20a0 [ 1897.999680] ? strncpy_from_user+0x9e/0x460 [ 1898.000246] ? finish_automount+0xa40/0xa40 [ 1898.000920] ? getname_flags.part.0+0x1dd/0x4f0 [ 1898.001664] __x64_sys_mount+0x27e/0x300 [ 1898.002319] ? path_mount+0x20a0/0x20a0 [ 1898.002949] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1898.003654] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1898.004327] do_syscall_64+0x33/0x40 [ 1898.004808] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1898.005472] RIP: 0033:0x7f9c93414b19 [ 1898.005950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1898.008365] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1898.009371] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1898.010271] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1898.011206] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1898.012099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1898.013041] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:15:56 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) [ 1898.053402] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:15:56 executing program 0: clone3(&(0x7f0000000180)={0x3040700, 0x0, 0x0, 0x0, {0xd}, 0x0, 0xfffffffffffffde9, 0x0, 0x0}, 0x58) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001240), 0x840, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001200), 0x400, &(0x7f0000001280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}, {@cache_none}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@cache_fscache}, {@access_client}, {@version_u}], [{@permit_directio}, {@dont_measure}, {@fsname={'fsname', 0x3d, 'cgroup.type\x00'}}, {@obj_type={'obj_type', 0x3d, 'cgroup.type\x00'}}, {@dont_measure}]}}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="b4199710f100897318000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) pidfd_send_signal(r2, 0x3a, &(0x7f0000000100)={0x1a, 0x918, 0x1}, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r2, 0x50009401, &(0x7f0000000200)={{r2}, "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"}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:15:56 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x12) 03:15:56 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x5, {{0x915afe8657c0a1b3, 0x1, 0x4}, 0x404}}, 0x18) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) keyctl$revoke(0x3, r0) 03:15:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x34000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:15:56 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000380)={0x7, 0x7f, 0x2}, 0x7) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) r3 = open$dir(&(0x7f0000000180)='./file1\x00', 0x802, 0x100) preadv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/9, 0x9}], 0x3, 0x5, 0x401) openat(r3, &(0x7f00000001c0)='./file1\x00', 0x1a3100, 0x18a) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x10, 0x4, 0x7}, 0xc02}}, 0x18) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x9bbb) copy_file_range(r5, &(0x7f0000000200)=0x1, r0, &(0x7f0000000280)=0x4c4, 0x869, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x431}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400) [ 1898.135188] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:15:56 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 03:15:56 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x12) 03:15:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1={0xfc, 0x19}, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:15:57 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x1}, 0xc02}}, 0x18) fcntl$setsig(r0, 0xa, 0x5) open$dir(&(0x7f0000000100)='./file1\x00', 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0x0, 0xee00}}, './file1\x00'}) syz_open_dev$evdev(&(0x7f0000000180), 0x5, 0x400) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x2400, 0x0) close(r3) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:15:57 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 44) 03:15:57 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 03:15:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x80000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:15:57 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x12) 03:15:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 1898.275007] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:15:57 executing program 1: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x12) 03:15:57 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) [ 1898.306477] FAULT_INJECTION: forcing a failure. [ 1898.306477] name failslab, interval 1, probability 0, space 0, times 0 [ 1898.307818] CPU: 1 PID: 11814 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1898.308555] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1898.309792] Call Trace: [ 1898.310088] dump_stack+0x107/0x163 [ 1898.310479] should_fail.cold+0x5/0xa [ 1898.310898] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1898.311451] should_failslab+0x5/0x10 [ 1898.311869] kmem_cache_alloc_trace+0x55/0x360 [ 1898.312375] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1898.312925] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1898.313459] __list_lru_init+0x403/0x7e0 [ 1898.313898] alloc_super+0x7f4/0x990 [ 1898.314308] sget+0x10b/0x500 [ 1898.314645] ? kill_litter_super+0xa0/0xa0 [ 1898.315112] ? devpts_remount+0x130/0x130 [ 1898.315563] mount_nodev+0x2e/0x120 [ 1898.315964] ? devpts_kill_sb+0x70/0x70 [ 1898.316369] legacy_get_tree+0x105/0x220 [ 1898.316819] ? ns_capable+0xd9/0x100 [ 1898.317221] vfs_get_tree+0x8e/0x2f0 [ 1898.317632] path_mount+0x13ba/0x20a0 [ 1898.318074] ? strncpy_from_user+0x9e/0x460 [ 1898.318548] ? finish_automount+0xa40/0xa40 [ 1898.318992] ? getname_flags.part.0+0x1dd/0x4f0 [ 1898.319509] __x64_sys_mount+0x27e/0x300 [ 1898.319948] ? path_mount+0x20a0/0x20a0 [ 1898.320385] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1898.320959] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1898.321479] do_syscall_64+0x33/0x40 [ 1898.321882] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1898.322445] RIP: 0033:0x7f9c93414b19 [ 1898.322830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1898.324806] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1898.325631] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1898.326415] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1898.327193] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1898.327913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1898.328689] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 1910.066346] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1917.554956] cgroup: fork rejected by pids controller in /syz6 [ 1917.561468] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:16:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x400300, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:16:16 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)=0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000580)=0x0) r4 = fork() ptrace(0x10, r4) ptrace$setregset(0x4205, r4, 0x2, &(0x7f0000000040)={0x0}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r5, &(0x7f0000000240)={0x7}, 0x7) clone3(&(0x7f0000000400)={0x100, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {}, &(0x7f0000000180)=""/164, 0xa4, &(0x7f0000000240)=""/241, &(0x7f00000003c0)=[r1, r0, r0, r0, r3, r0, r4, r0], 0x8, {r5}}, 0x58) mount(&(0x7f0000000480)=@filename='./file1\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='binfmt_misc\x00', 0x2020001, &(0x7f0000000540)='-$\n]++\x00') 03:16:16 executing program 1: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x12) 03:16:16 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 03:16:16 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0xb040300, 0x0, 0x0, 0x0, {0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) execveat(r2, &(0x7f0000000180)='./file1\x00', 0x0, 0x0, 0x0) 03:16:16 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 45) 03:16:16 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r0 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000180)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "198be94fbb35c897dcf37f04ebd4f9f4ecd9bf010e61f00f837f8e57242cba52965f202765246dad807ffa6de0379fed4c517d5e92f64077beb89fbb4c6a4ca9", 0x3f}, 0x48, r2) keyctl$reject(0x13, r0, 0x1ff, 0xae0, r2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:16:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1={0xfc, 0x1, '\x00', 0x2}, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:16:16 executing program 1: clone3(0x0, 0x0) socket$netlink(0x10, 0x3, 0x12) [ 1917.590534] FAULT_INJECTION: forcing a failure. [ 1917.590534] name failslab, interval 1, probability 0, space 0, times 0 [ 1917.592906] CPU: 1 PID: 11876 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1917.594310] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1917.596623] Call Trace: [ 1917.597168] dump_stack+0x107/0x163 [ 1917.597916] should_fail.cold+0x5/0xa [ 1917.598708] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1917.599742] should_failslab+0x5/0x10 [ 1917.600520] kmem_cache_alloc_trace+0x55/0x360 [ 1917.601459] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1917.602513] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1917.603522] __list_lru_init+0x403/0x7e0 [ 1917.604373] alloc_super+0x7f4/0x990 [ 1917.605152] sget+0x10b/0x500 [ 1917.605797] ? kill_litter_super+0xa0/0xa0 [ 1917.606673] ? devpts_remount+0x130/0x130 [ 1917.607523] mount_nodev+0x2e/0x120 [ 1917.608263] ? devpts_kill_sb+0x70/0x70 [ 1917.609078] legacy_get_tree+0x105/0x220 [ 1917.609907] ? ns_capable+0xd9/0x100 [ 1917.610689] vfs_get_tree+0x8e/0x2f0 [ 1917.611454] path_mount+0x13ba/0x20a0 [ 1917.612240] ? strncpy_from_user+0x9e/0x460 [ 1917.613118] ? finish_automount+0xa40/0xa40 [ 1917.613996] ? getname_flags.part.0+0x1dd/0x4f0 [ 1917.614964] __x64_sys_mount+0x27e/0x300 [ 1917.615789] ? path_mount+0x20a0/0x20a0 [ 1917.616601] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1917.617666] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1917.618735] do_syscall_64+0x33/0x40 [ 1917.619507] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1917.620552] RIP: 0033:0x7f9c93414b19 [ 1917.621314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1917.625077] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1917.626632] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1917.628102] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1917.629551] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1917.631023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1917.632470] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:16:16 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) 03:16:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1={0xfc, 0x1, '\x00', 0xf}, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 1930.778511] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:16:38 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000540)='5', 0x1, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000180)='^\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:16:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xe0ffff, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:16:38 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 46) 03:16:38 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) 03:16:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1={0xfc, 0x1, '\x00', 0x8f}, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:16:38 executing program 1: clone3(0x0, 0x0) socket$netlink(0x10, 0x3, 0x12) 03:16:38 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) close_range(r0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:16:38 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000580)={0x0, 0x4, 0x7}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = getegid() setgid(r1) write$P9_RSTATu(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="5c0000007d01000000405c0000000300000005a3ec328a3ee4601bd53c73d322e2c9aedc220000000000000000070000007e000000010400000000000007003a7e295d5d2e23050073797a300008005b2a5ee124", @ANYRES32=0x0, @ANYRES32=r1, @ANYRES32=0xee00], 0x5c) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)) getpid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) r4 = openat$cgroup(r0, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) clone3(&(0x7f0000000440)={0x1892e80, &(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0), {0x17}, &(0x7f0000000200)=""/138, 0x8a, &(0x7f00000002c0)=""/136, &(0x7f00000003c0), 0x0, {r4}}, 0x58) [ 1939.205987] FAULT_INJECTION: forcing a failure. [ 1939.205987] name failslab, interval 1, probability 0, space 0, times 0 [ 1939.208404] CPU: 1 PID: 12095 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1939.209846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1939.212202] Call Trace: [ 1939.212750] dump_stack+0x107/0x163 [ 1939.213508] should_fail.cold+0x5/0xa [ 1939.214291] ? create_object.isra.0+0x3a/0xa20 [ 1939.215246] should_failslab+0x5/0x10 [ 1939.216042] kmem_cache_alloc+0x5b/0x350 [ 1939.216895] ? mark_held_locks+0x9e/0xe0 [ 1939.217734] create_object.isra.0+0x3a/0xa20 [ 1939.218665] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1939.219723] kmem_cache_alloc_trace+0x151/0x360 [ 1939.220701] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1939.221715] __list_lru_init+0x403/0x7e0 [ 1939.222572] alloc_super+0x7f4/0x990 [ 1939.223358] sget+0x10b/0x500 [ 1939.224011] ? kill_litter_super+0xa0/0xa0 [ 1939.224883] ? devpts_remount+0x130/0x130 [ 1939.225744] mount_nodev+0x2e/0x120 [ 1939.226491] ? devpts_kill_sb+0x70/0x70 [ 1939.227330] legacy_get_tree+0x105/0x220 [ 1939.228169] ? ns_capable+0xd9/0x100 [ 1939.228949] vfs_get_tree+0x8e/0x2f0 [ 1939.229720] path_mount+0x13ba/0x20a0 [ 1939.230513] ? strncpy_from_user+0x9e/0x460 [ 1939.231421] ? finish_automount+0xa40/0xa40 [ 1939.232316] ? getname_flags.part.0+0x1dd/0x4f0 [ 1939.233289] __x64_sys_mount+0x27e/0x300 [ 1939.234128] ? path_mount+0x20a0/0x20a0 [ 1939.234969] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1939.236051] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1939.237113] do_syscall_64+0x33/0x40 [ 1939.237884] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1939.238947] RIP: 0033:0x7f9c93414b19 [ 1939.239723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1939.243518] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1939.245098] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1939.246568] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1939.248025] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1939.249468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1939.250935] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 1939.260819] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:16:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2={0xfc, 0x19}}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:16:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xf0ffff, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:16:38 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e24, 0x80, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8}}, 0x0, 0x0, 0x5, 0x0, "75c70d4f550919a06f776cef96fd10b2930ac229f3b6fa5a3d72cc5cc9ac36ff0e7804824364d498537e39804f14a25a0a770533a7cf3263be804f461b33219fddddab53f2f0b259ede56d32e3af5833"}, 0xd8) 03:16:38 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r4, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e23, @local}}, 0x0, 0x0, 0x20, 0x0, "5ec9eb9d445f1f6da1a6e8688f1ebd0f6b87a77d1dc9bcb0f8fd974d365e82badd72c0575eb7e98d1bc4dee173ffea3884e4fc00a5ff2cc8faba0538183661aa6d7535481b14aabd589d2326d8d8301c"}, 0xd8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) sendfile(r0, r2, &(0x7f0000000040)=0x7fffffff, 0xc6c) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000500)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001500)={{r5, 0x0, 0x7, 0x1, 0x80004, 0x3, 0x3, 0x44, 0x5, 0x3, 0x9, 0x0, 0x3, 0x8, 0x10000}}) syz_open_procfs(r1, &(0x7f0000000280)='net/hci\x00') execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1939.388899] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:16:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:16:38 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000180)={0x4a, 0x6f, 0x1, {0x5, [{0x0, 0x4, 0x6}, {0x8, 0x1}, {0x80, 0x4, 0x1}, {0x40, 0x0, 0x5}, {0x44, 0x0, 0xfff}]}}, 0x4a) [ 1952.425478] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:16:59 executing program 1: clone3(0x0, 0x0) socket$netlink(0x10, 0x3, 0x12) 03:16:59 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 47) 03:16:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) fallocate(r1, 0x0, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000001c0), 0x77, 0x20001) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000200)) sendfile(r1, r0, 0x0, 0x9bbb) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x20, 0x4, 0x7}, 0x20}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e23, 0x4b6, @private0={0xfc, 0x0, '\x00', 0x1}, 0x3ff}, 0x1c) 03:16:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7}, 0x7) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file1\x00') 03:16:59 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r1}) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "198be94fbb35c897dcf37f04ebd4f9f4ecd9bf010e61f00f837f8e57242cba52965f202765246dad807ffa6de0379fed4c517d5e92f64077beb89fbb4c6a4ca9", 0x3f}, 0x48, r1) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000180)='syz', r2) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:16:59 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500000000000000) 03:16:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2={0xfc, 0x2, '\x00', 0x2}}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:16:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x1000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 1960.501342] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1960.503474] FAULT_INJECTION: forcing a failure. [ 1960.503474] name failslab, interval 1, probability 0, space 0, times 0 [ 1960.506009] CPU: 0 PID: 12346 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1960.507499] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1960.509922] Call Trace: [ 1960.510513] dump_stack+0x107/0x163 [ 1960.511335] should_fail.cold+0x5/0xa [ 1960.512157] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1960.513232] should_failslab+0x5/0x10 [ 1960.514039] kmem_cache_alloc_trace+0x55/0x360 [ 1960.515026] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1960.516105] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1960.517161] __list_lru_init+0x403/0x7e0 [ 1960.518053] alloc_super+0x7f4/0x990 [ 1960.518862] sget+0x10b/0x500 [ 1960.519529] ? kill_litter_super+0xa0/0xa0 [ 1960.520409] ? devpts_remount+0x130/0x130 [ 1960.521275] mount_nodev+0x2e/0x120 [ 1960.522047] ? devpts_kill_sb+0x70/0x70 [ 1960.522870] legacy_get_tree+0x105/0x220 [ 1960.523735] ? ns_capable+0xd9/0x100 [ 1960.524515] vfs_get_tree+0x8e/0x2f0 [ 1960.525286] path_mount+0x13ba/0x20a0 [ 1960.526082] ? strncpy_from_user+0x9e/0x460 [ 1960.526983] ? finish_automount+0xa40/0xa40 [ 1960.527887] ? getname_flags.part.0+0x1dd/0x4f0 [ 1960.528888] __x64_sys_mount+0x27e/0x300 [ 1960.529754] ? path_mount+0x20a0/0x20a0 [ 1960.530598] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1960.531710] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1960.532807] do_syscall_64+0x33/0x40 [ 1960.533595] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1960.534675] RIP: 0033:0x7f9c93414b19 [ 1960.535465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1960.539331] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1960.540947] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1960.542473] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1960.543992] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1960.545481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1960.546961] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:16:59 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 48) [ 1960.619044] FAULT_INJECTION: forcing a failure. [ 1960.619044] name failslab, interval 1, probability 0, space 0, times 0 [ 1960.621600] CPU: 0 PID: 12412 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1960.623053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1960.625371] Call Trace: [ 1960.625926] dump_stack+0x107/0x163 [ 1960.626684] should_fail.cold+0x5/0xa [ 1960.627543] ? create_object.isra.0+0x3a/0xa20 [ 1960.628488] should_failslab+0x5/0x10 [ 1960.629303] kmem_cache_alloc+0x5b/0x350 [ 1960.630162] ? mark_held_locks+0x9e/0xe0 [ 1960.631037] create_object.isra.0+0x3a/0xa20 [ 1960.631962] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1960.633062] kmem_cache_alloc_trace+0x151/0x360 [ 1960.634071] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1960.635154] __list_lru_init+0x403/0x7e0 [ 1960.636039] alloc_super+0x7f4/0x990 [ 1960.636856] sget+0x10b/0x500 [ 1960.637539] ? kill_litter_super+0xa0/0xa0 [ 1960.638443] ? devpts_remount+0x130/0x130 [ 1960.639333] mount_nodev+0x2e/0x120 [ 1960.640133] ? devpts_kill_sb+0x70/0x70 [ 1960.640965] legacy_get_tree+0x105/0x220 [ 1960.641833] ? ns_capable+0xd9/0x100 [ 1960.642619] vfs_get_tree+0x8e/0x2f0 [ 1960.643436] path_mount+0x13ba/0x20a0 [ 1960.644268] ? strncpy_from_user+0x9e/0x460 [ 1960.645204] ? finish_automount+0xa40/0xa40 [ 1960.646141] ? getname_flags.part.0+0x1dd/0x4f0 [ 1960.647187] __x64_sys_mount+0x27e/0x300 [ 1960.648069] ? path_mount+0x20a0/0x20a0 [ 1960.648933] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1960.650052] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1960.651190] do_syscall_64+0x33/0x40 [ 1960.651992] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1960.653091] RIP: 0033:0x7f9c93414b19 [ 1960.653879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1960.657759] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1960.659388] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1960.660892] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1960.662415] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1960.663946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1960.665467] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:16:59 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) keyctl$join(0x1, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:16:59 executing program 1: clone3(&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x12) 03:17:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x2000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:17:18 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:17:18 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) openat(r1, &(0x7f0000000040)='./file1\x00', 0x60a180, 0x90) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) fallocate(r0, 0x2, 0x10001, 0x3f) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:17:18 executing program 1: clone3(&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x12) 03:17:18 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600000000000000) 03:17:18 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000680), 0x36182, 0x0) readahead(r0, 0x7, 0x4) r1 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000100), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000740)=""/244, 0xf4}, {&(0x7f0000000180)=""/139, 0x8b}, {&(0x7f0000000300)=""/181, 0xb5}, {&(0x7f00000003c0)=""/81, 0x51}, {&(0x7f0000000240)=""/182, 0xb6}, {&(0x7f00000006c0)=""/112, 0x70}], 0x6, &(0x7f0000000600)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x50}, 0x2) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r3, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) kcmp(r1, r2, 0x6, 0xffffffffffffffff, r3) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:17:18 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 49) 03:17:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2={0xfc, 0x2, '\x00', 0xf}}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 1979.783468] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1979.784353] FAULT_INJECTION: forcing a failure. [ 1979.784353] name failslab, interval 1, probability 0, space 0, times 0 [ 1979.787713] CPU: 0 PID: 12602 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1979.789150] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1979.791486] Call Trace: [ 1979.792037] dump_stack+0x107/0x163 [ 1979.792796] should_fail.cold+0x5/0xa [ 1979.793585] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1979.794645] should_failslab+0x5/0x10 [ 1979.795441] kmem_cache_alloc_trace+0x55/0x360 [ 1979.796382] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1979.797439] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1979.798457] __list_lru_init+0x403/0x7e0 [ 1979.799335] alloc_super+0x7f4/0x990 [ 1979.800120] sget+0x10b/0x500 [ 1979.800771] ? kill_litter_super+0xa0/0xa0 [ 1979.801643] ? devpts_remount+0x130/0x130 [ 1979.802502] mount_nodev+0x2e/0x120 [ 1979.803261] ? devpts_kill_sb+0x70/0x70 [ 1979.804079] legacy_get_tree+0x105/0x220 [ 1979.804920] ? ns_capable+0xd9/0x100 [ 1979.805692] vfs_get_tree+0x8e/0x2f0 [ 1979.806467] path_mount+0x13ba/0x20a0 [ 1979.807273] ? strncpy_from_user+0x9e/0x460 [ 1979.808171] ? finish_automount+0xa40/0xa40 [ 1979.809063] ? getname_flags.part.0+0x1dd/0x4f0 [ 1979.810055] __x64_sys_mount+0x27e/0x300 [ 1979.810893] ? path_mount+0x20a0/0x20a0 [ 1979.811743] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1979.812824] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1979.813898] do_syscall_64+0x33/0x40 [ 1979.814671] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1979.815739] RIP: 0033:0x7f9c93414b19 [ 1979.816508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1979.820299] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1979.821865] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 1979.823343] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 1979.824814] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1979.826279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1979.827764] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:17:18 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) getsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000240), &(0x7f00000002c0)=0x4) clone3(&(0x7f0000000080)={0x3841900, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='syz', r0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r2) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:17:18 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000000000000000000005896df016b2184f36634789ddbaaca3faa168ba50cb84d40077ad19b5b92e639bd07a572324993b9028e728e62d8a1a47dbb2db9bba516f51185cc3894c76a41c3aaf5d040000006d2dbb3fb5734ad45aad64c0bb8a6bfd84b7cf8cc728bec805fbe2b168ade9a9571651e54c9df085595e5550db1afbc9aa6a858bd14e399f79d4e1e3df090e2cc738f00bcbeaa4790f3f67d77dcdf04005639fdce690c7bf543ff94e04d941f79d8bb960d7f1c4e866"]) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000380)={&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/132, 0x84, 0x1, &(0x7f0000000280)=""/200, 0xc8}, &(0x7f00000003c0)=0x40) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) fallocate(r2, 0x0, 0x2, 0x7) 03:17:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x3000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:17:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2={0xfc, 0x2, '\x00', 0x8f}}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 1980.004928] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:17:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7}, 0x7) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x4, {{0x915afe8657c0a1b3, 0x4, 0x1}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:17:18 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = dup(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e22, 0xdd, @dev={0xfe, 0x80, '\x00', 0x43}}, {0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}, 0x1, [0x6, 0x1, 0x98, 0x1df, 0x1, 0x3, 0x1, 0x7ff]}, 0x5c) sendfile(r1, r0, 0x0, 0x9bbb) splice(0xffffffffffffffff, &(0x7f0000000040)=0xfffffffffffffe00, r0, &(0x7f0000000100)=0x1f, 0x1, 0x4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:17:18 executing program 1: clone3(&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x12) 03:17:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:17:18 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x5366baddc1b8c440, 0x0, 0x0, 0x0, {0x1a}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000780)={'syz_tun\x00', 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000002a40), 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000180)=[{{&(0x7f0000005340)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000c00)=[{&(0x7f00000000c0)="863c53142513ecdb27a6ab07930037fea1b95edd0a793e20f16d4bdf58466bfcdeabfaa8fae80ddc04eda5586968093568c97afd96e7a0ba5ad491c36c3ce1cdd6b93e6754850640bc5549a55850a142c2b717ff133f1788e2f6a77b27a2e152e2f9bb44f02bf709a71a95e3846188dd87c8615eeeed290bd7fc6b", 0x7b}, {&(0x7f00000001c0)="750285df52d84f62bd50d36115b28f5d4381a38f2a3b2084d1cbf91d8eb46140fd2ac11963561d29d796e90c463746fe5108a3e6f57ba77d67dae81d0efefc12756faf8a5469e43bc19d4c5601c01d06e8b598f97062c3891e8729e62fa3a57b5d8c4c30c109ce108e0287a8cbfd5daf0dfc5fd350e287849a54b8057e9bec9d5e7c45183e5619f539db85c04c27d1e03a8cd46e128ba62c158874e38913a72d70f72c9163967530217b8331630bda75e49d73c7561a5ae381b287ba14bc176b28e8db339cae1350edff2caa23746a9873355128c2883028956f225759f5fc0169ee6e", 0xe3}, {&(0x7f0000000c40)="a3a3b0812cb089c75f18bd2b4f7cc1969e1df0fa36573fd75818485d031787eac887206ede54c99965388c77e2a6918cc9e29c3e63f91f66c690304714da68b5a0ffac527978674246399a0cd5f0cbebf3c6a9be82bfcadc3f5af3233e30b1aa1b018318679cdfd61d2cc5ffbfb0937b4b5089d065bff12b0d5255cbcde5b03ba33a70627be3043ec54647caf2461f20ea0648e818ef8494eb53881253cbad6d687e3cc9219abe89df8a91b873e55980b6e9ebee4ae01665aefe1e91110b62536e3401e47b824f955b8283381c75f712119e5a26569181a77b316a0081e09f890e8655661d9a297f7d1aa11dca45b66a9a757b9865db451ad2b214f971a53c829c1c04bc16ce5fedf534ff0ba7cd4b6116e2c4a1ef7790e10dcb159bd74a25bb7fabf9f5e7dbafa93f624eb0277d141dd169417b426f1735d546066230210de511cf225994ac9e78b667d2f2ff2cda7cf4b7888f4820f48ee4278b7c069035bb16ebcf50d918a34f3dc7387beba08ea097440d5a14d36cedba922e4adf1289e3dd09a05d317b72818850d4f95af720d1bf7405697f0a97667ec37108e4559c3c4ac19d31f55e27cb923d5c2bf9494654ead05824e73099ba9c54fa4142c84e3ebb788738454ba0346b97b4b78b826d25dd8cbb2bcaab25f411b90ed069dd7ec623a0a0e1ce228fdf56892dc9d4d2c2270da9da0e6b9b36161cdc97e635099bcf60d4510159b10317fb0d3fe8688330e2afb1a5789f9fe2061b652c2c9d0b64c191385e47d353836b57f26988632d64809f015e81affc98c715674a2ae3c32c286dbf696d2665e382ce497c588af2a93d0ea73f45b1eea19a7a2056416156c97e20afe563feeb25a946b9b3a438b440d2e853a7a253dbf9c727d3d806e506a819effc6786253c93738a5728b8b3ecaedd6cd126460910f0709e52c67a47045651e13911b998e8d4c3acc1d06bc77fe2e64cde9f19cf47f9af409002f3801ff1bf3b662586619a5baaf361566de8c0c1c607b6e76254baf2d643998e4548ecf83676ae87c162819c3cbd11604def370ecfe9ea3b5884001688fe69cd6b88b8d153b67b32df9b8195813f2ba54973fca8292516a1ae940bcb8f8951b94bc39be17016b215199f51f4cad79f16b19521faee353d899e9e48a1941d755feb5eb4d955faff9cc2f2ea6903b67306f4677b1bd97b15e2b684156f992ec79ee957ce496c80b634e243edfdc775455a1263551410db97ce7a2bfd0eadb7e061e446272cd0b4f61fbd3d2a251f82a67fd2fccce157c22e5eb6364db9a7905bc06933f65cc61342182ca83a31fe56b022e9d4dbb1f5c998a1e4ac9715ae40a17858fb109fd67531062b96d5d72e6a567bd2445a37950f792e5e024d3aea4a8aa664c7fd932db4c14815ac34cc7bba21a22fa37a676ab7ffff5bbabd78bd0d7c8666b76e41a53567aead616856b3c4492a6a9d7d17f81e49b98e0a94cadcd629fbfd6e5b2d41e4c26b9befd6d31acd45ca408408e682a58149c9d02bd362efb42bd2dd60cc1fe346f7986f0726205b4115ffcd2dd669345188", 0x453}], 0x3, &(0x7f00000002c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @dev={0xac, 0x14, 0x14, 0x32}, @private}}}, @ip_retopts={{0x28, 0x0, 0x7, {[@rr={0x7, 0xb, 0x7c, [@private, @empty]}, @generic={0x88, 0xa, "b501c8739265b5f1"}]}}}], 0x48}}], 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000780)={'syz_tun\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000000180)=[{{&(0x7f0000005340)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000c00)=[{&(0x7f00000000c0)="863c53142513ecdb27a6ab07930037fea1b95edd0a793e20f16d4bdf58466bfcdeabfaa8fae80ddc04eda5586968093568c97afd96e7a0ba5ad491c36c3ce1cdd6b93e6754850640bc5549a55850a142c2b717ff133f1788e2f6a77b27a2e152e2f9bb44f02bf709a71a95e3846188dd87c8615eeeed290bd7fc6b", 0x7b}, {&(0x7f00000001c0)="750285df52d84f62bd50d36115b28f5d4381a38f2a3b2084d1cbf91d8eb46140fd2ac11963561d29d796e90c463746fe5108a3e6f57ba77d67dae81d0efefc12756faf8a5469e43bc19d4c5601c01d06e8b598f97062c3891e8729e62fa3a57b5d8c4c30c109ce108e0287a8cbfd5daf0dfc5fd350e287849a54b8057e9bec9d5e7c45183e5619f539db85c04c27d1e03a8cd46e128ba62c158874e38913a72d70f72c9163967530217b8331630bda75e49d73c7561a5ae381b287ba14bc176b28e8db339cae1350edff2caa23746a9873355128c2883028956f225759f5fc0169ee6e", 0xe3}, {&(0x7f0000000c40)="a3a3b0812cb089c75f18bd2b4f7cc1969e1df0fa36573fd75818485d031787eac887206ede54c99965388c77e2a6918cc9e29c3e63f91f66c690304714da68b5a0ffac527978674246399a0cd5f0cbebf3c6a9be82bfcadc3f5af3233e30b1aa1b018318679cdfd61d2cc5ffbfb0937b4b5089d065bff12b0d5255cbcde5b03ba33a70627be3043ec54647caf2461f20ea0648e818ef8494eb53881253cbad6d687e3cc9219abe89df8a91b873e55980b6e9ebee4ae01665aefe1e91110b62536e3401e47b824f955b8283381c75f712119e5a26569181a77b316a0081e09f890e8655661d9a297f7d1aa11dca45b66a9a757b9865db451ad2b214f971a53c829c1c04bc16ce5fedf534ff0ba7cd4b6116e2c4a1ef7790e10dcb159bd74a25bb7fabf9f5e7dbafa93f624eb0277d141dd169417b426f1735d546066230210de511cf225994ac9e78b667d2f2ff2cda7cf4b7888f4820f48ee4278b7c069035bb16ebcf50d918a34f3dc7387beba08ea097440d5a14d36cedba922e4adf1289e3dd09a05d317b72818850d4f95af720d1bf7405697f0a97667ec37108e4559c3c4ac19d31f55e27cb923d5c2bf9494654ead05824e73099ba9c54fa4142c84e3ebb788738454ba0346b97b4b78b826d25dd8cbb2bcaab25f411b90ed069dd7ec623a0a0e1ce228fdf56892dc9d4d2c2270da9da0e6b9b36161cdc97e635099bcf60d4510159b10317fb0d3fe8688330e2afb1a5789f9fe2061b652c2c9d0b64c191385e47d353836b57f26988632d64809f015e81affc98c715674a2ae3c32c286dbf696d2665e382ce497c588af2a93d0ea73f45b1eea19a7a2056416156c97e20afe563feeb25a946b9b3a438b440d2e853a7a253dbf9c727d3d806e506a819effc6786253c93738a5728b8b3ecaedd6cd126460910f0709e52c67a47045651e13911b998e8d4c3acc1d06bc77fe2e64cde9f19cf47f9af409002f3801ff1bf3b662586619a5baaf361566de8c0c1c607b6e76254baf2d643998e4548ecf83676ae87c162819c3cbd11604def370ecfe9ea3b5884001688fe69cd6b88b8d153b67b32df9b8195813f2ba54973fca8292516a1ae940bcb8f8951b94bc39be17016b215199f51f4cad79f16b19521faee353d899e9e48a1941d755feb5eb4d955faff9cc2f2ea6903b67306f4677b1bd97b15e2b684156f992ec79ee957ce496c80b634e243edfdc775455a1263551410db97ce7a2bfd0eadb7e061e446272cd0b4f61fbd3d2a251f82a67fd2fccce157c22e5eb6364db9a7905bc06933f65cc61342182ca83a31fe56b022e9d4dbb1f5c998a1e4ac9715ae40a17858fb109fd67531062b96d5d72e6a567bd2445a37950f792e5e024d3aea4a8aa664c7fd932db4c14815ac34cc7bba21a22fa37a676ab7ffff5bbabd78bd0d7c8666b76e41a53567aead616856b3c4492a6a9d7d17f81e49b98e0a94cadcd629fbfd6e5b2d41e4c26b9befd6d31acd45ca408408e682a58149c9d02bd362efb42bd2dd60cc1fe346f7986f0726205b4115ffcd2dd669345188", 0x453}], 0x3, &(0x7f00000002c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @dev={0xac, 0x14, 0x14, 0x32}, @private}}}, @ip_retopts={{0x28, 0x0, 0x7, {[@rr={0x7, 0xb, 0x7c, [@private, @empty]}, @generic={0x88, 0xa, "b501c8739265b5f1"}]}}}], 0x48}}], 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000780)={'syz_tun\x00', 0x0}) sendmmsg$inet(r6, &(0x7f0000000180)=[{{&(0x7f0000005340)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000c00)=[{&(0x7f00000000c0)="863c53142513ecdb27a6ab07930037fea1b95edd0a793e20f16d4bdf58466bfcdeabfaa8fae80ddc04eda5586968093568c97afd96e7a0ba5ad491c36c3ce1cdd6b93e6754850640bc5549a55850a142c2b717ff133f1788e2f6a77b27a2e152e2f9bb44f02bf709a71a95e3846188dd87c8615eeeed290bd7fc6b", 0x7b}, {&(0x7f00000001c0)="750285df52d84f62bd50d36115b28f5d4381a38f2a3b2084d1cbf91d8eb46140fd2ac11963561d29d796e90c463746fe5108a3e6f57ba77d67dae81d0efefc12756faf8a5469e43bc19d4c5601c01d06e8b598f97062c3891e8729e62fa3a57b5d8c4c30c109ce108e0287a8cbfd5daf0dfc5fd350e287849a54b8057e9bec9d5e7c45183e5619f539db85c04c27d1e03a8cd46e128ba62c158874e38913a72d70f72c9163967530217b8331630bda75e49d73c7561a5ae381b287ba14bc176b28e8db339cae1350edff2caa23746a9873355128c2883028956f225759f5fc0169ee6e", 0xe3}, {&(0x7f0000000c40)="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", 0x453}], 0x3, &(0x7f00000002c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @dev={0xac, 0x14, 0x14, 0x32}, @private}}}, @ip_retopts={{0x28, 0x0, 0x7, {[@rr={0x7, 0xb, 0x7c, [@private, @empty]}, @generic={0x88, 0xa, "b501c8739265b5f1"}]}}}], 0x48}}], 0x1, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000002c0)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0x20000}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x39}}, @can={0x1d, 0x0}, 0x401, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x3, 0xffb0}) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000029c0)={&(0x7f0000000380)={0x261c, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x12b0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x190, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'rxrpc_s\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '*.:-+[\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5b7}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'rxrpc_s\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '($)\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\':,!\\.#\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2d}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'rxrpc_s\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff76ae}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'rxrpc_s\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x855}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, './,\\#&\\@/\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x401}, @ETHTOOL_A_BITSET_BITS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f94}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_VALUE={0x73, 0x4, "f09c53680401d37e2d6566e8dc95db5cf7461ff51d97d3836ca19abb78762f471ae4287fc080cb386992dc1ef0889a881a73a558004ba2ef671f0882869831fa5543a592acee1426c1ba20e7ee49d5723d00f917e91d64cdc29bb32bd8e8772248902a2e5cf57498b0be5a13c2b855"}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0x72, 0x5, "478e4bd4b8a8620d04499449ad95b299bdda549891a3c08e1784c3b85c73d0ee8634ac219e56bd2600a924cbfc407a424d9c985a866824f8f7ea18d0cf5a01c8378513aa79efa5ea9f62f6bcb33b76158a959e1e22e7399b87e5004a3e5c11f75686b787227d3dfcf552f0c8701e"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x121c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x60, 0x5, "109c35c02c50a721db3bfe689f0976f097e93da3e5099297b84c924587dff3cfca7109b394edfa3390761440e56167bc36242e9c8d0c30f84d78b36bf3ce65e79f9c069ca8de02c68b5535e5246c260d5686f0499596082c3790d1f0"}, @ETHTOOL_A_BITSET_VALUE={0x92, 0x4, "a3eaf5aa1d3469f7a7e8d5d820b0aebed03b03a0fdffa4d2df250cd0166ffd61a63b94a50aa8bcf8622ac587556d579a2d69ac4ea594249480f957df6a3d4b5a7ba55e72cc99a24e2b2fed472d5d604bb3cbc9c4dd79ba09544605ec3ea5d4aaa7d4d4428389c702a1cb3199852681d65312f45b33b3f2b55cd561a442e2d355ff350472b61547d62edcb2c29063"}, @ETHTOOL_A_BITSET_MASK={0x57, 0x5, "cb28579ffb0621664e1f961da77d07f46d12fb360075764cfc6515a05f01f0c996813315273712ca6c65a6f3ab86963ab4a2e8e85cbbebd7a26aec2a61f91ebefb640b00875bf200f2d23db67a1a26bbcf22c1"}, @ETHTOOL_A_BITSET_VALUE={0xc4, 0x4, "181a3c8a323fa083dc395bb299791beaae733c39eb9e46afc79ce6cad7ce5f78751b7c9a76aa7157e1cda7e6ce9b25f567e7da27ee22a61cfc14d21d1de5375f63199d7f80d865c153af59498849c2a8098d49afb8e0acecf70ff307d2a4906c0d4ac45ea981f4ac599e2c979d561972c3b28596b9d258d31242f676a0e7725b85341f7f5f7d375087d25b4c4e61e4324200d66ee4b5b4e94a37b56eb8493293c9177f779e8cc298b6bf6ba12b1c2c04deff868723e94a4cc2126f70cb60222f"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "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"}]}, @ETHTOOL_A_DEBUG_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xb0, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '!%\xf9)*$@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '%#\\\xd8),:$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '[^.{{*\xeb..)\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}]}, {0x4}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*[/\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[&/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}]}]}]}, @ETHTOOL_A_DEBUG_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x261c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) 03:17:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x4000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:17:18 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) [ 1980.171995] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1992.194934] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:17:40 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000001c0)=ANY=[]) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000100)=0x20, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000180), 0x4) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:17:40 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$AUTOFS_IOC_CATATONIC(0xffffffffffffffff, 0x9362, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file1\x00'}) 03:17:40 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 03:17:40 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) clone3(&(0x7f0000000100)={0x250340380, 0x0, 0x0, 0x0, {}, 0x0, 0x62, 0x0, 0x0, 0x0, {r0}}, 0x58) r1 = syz_io_uring_setup(0x25, &(0x7f0000000080), &(0x7f0000fe9000/0x4000)=nil, &(0x7f0000fea000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) signalfd4(r1, &(0x7f00000001c0)={[0x7]}, 0x8, 0x80800) syz_io_uring_submit(r2, r3, &(0x7f0000000580)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, 0x0}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/class/bsg', 0x210200, 0xe2) syz_io_uring_submit(r2, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x6000, @fd_index=0x2, 0xa62, 0xfc83, 0x3ff, 0x6, 0x0, {0x3}}, 0x5) 03:17:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:17:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x5000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:17:40 executing program 1: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x12) 03:17:40 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 50) 03:17:40 executing program 1: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x0) [ 2001.213065] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:17:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7}, 0x7) ioctl$TCSBRKP(r0, 0x5425, 0x7fff) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2001.284015] FAULT_INJECTION: forcing a failure. [ 2001.284015] name failslab, interval 1, probability 0, space 0, times 0 [ 2001.286982] CPU: 0 PID: 13078 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2001.288695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2001.291093] Call Trace: [ 2001.291673] dump_stack+0x107/0x163 [ 2001.292430] should_fail.cold+0x5/0xa [ 2001.293220] ? create_object.isra.0+0x3a/0xa20 [ 2001.294164] should_failslab+0x5/0x10 [ 2001.294946] kmem_cache_alloc+0x5b/0x350 [ 2001.295806] ? mark_held_locks+0x9e/0xe0 [ 2001.296645] create_object.isra.0+0x3a/0xa20 [ 2001.297541] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2001.298588] kmem_cache_alloc_trace+0x151/0x360 [ 2001.299592] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2001.300608] __list_lru_init+0x403/0x7e0 [ 2001.301479] alloc_super+0x7f4/0x990 [ 2001.302256] sget+0x10b/0x500 [ 2001.302919] ? kill_litter_super+0xa0/0xa0 [ 2001.303806] ? devpts_remount+0x130/0x130 [ 2001.304657] mount_nodev+0x2e/0x120 [ 2001.305400] ? devpts_kill_sb+0x70/0x70 [ 2001.306210] legacy_get_tree+0x105/0x220 [ 2001.307034] ? ns_capable+0xd9/0x100 [ 2001.307808] vfs_get_tree+0x8e/0x2f0 [ 2001.308572] path_mount+0x13ba/0x20a0 [ 2001.309358] ? strncpy_from_user+0x9e/0x460 [ 2001.310242] ? finish_automount+0xa40/0xa40 [ 2001.311123] ? getname_flags.part.0+0x1dd/0x4f0 [ 2001.312113] __x64_sys_mount+0x27e/0x300 [ 2001.312942] ? path_mount+0x20a0/0x20a0 [ 2001.313757] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2001.314820] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2001.315898] do_syscall_64+0x33/0x40 [ 2001.316657] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2001.317694] RIP: 0033:0x7f9c93414b19 [ 2001.318454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2001.322168] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2001.323768] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2001.325207] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2001.326644] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2001.328098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2001.329535] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2001.360611] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:17:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x6000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:17:40 executing program 1: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x0) 03:17:40 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = fork() ptrace(0x10, r4) ptrace$setregset(0x4205, r4, 0x2, &(0x7f0000000040)={0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000000300)={0x0, 0x0}) r6 = fork() ptrace(0x10, r6) ptrace(0x11, r6) syz_open_procfs(r6, &(0x7f00000001c0)='net/rt6_stats\x00') r7 = getpid() r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r8, &(0x7f0000000240)={0x7}, 0x7) clone3(&(0x7f0000000440)={0x124000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x9}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000380)=""/91, &(0x7f0000000400)=[r4, r3, r5, r6, r3, r7], 0x6, {r8}}, 0x58) 03:17:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x8}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2001.493459] cgroup: fork rejected by pids controller in /syz3 03:17:53 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x80, 0x81) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:17:53 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x4080, 0x0) socket$unix(0x1, 0x5, 0x0) io_uring_enter(0xffffffffffffffff, 0x151f, 0x2a6c, 0x2, &(0x7f0000000140)={[0x8001]}, 0x8) kcmp(r0, r0, 0x0, r1, 0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) write$vga_arbiter(r1, &(0x7f0000000180)=@unlock_all, 0xb) creat(&(0x7f0000000100)='./file1/file0\x00', 0x2b9) 03:17:53 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 51) 03:17:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xf}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:17:53 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2321000000000000) 03:17:53 executing program 1: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$netlink(0x10, 0x3, 0x0) [ 2014.289682] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:17:53 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) r2 = signalfd(r1, &(0x7f0000003840)={[0x7fff]}, 0x8) connect$inet6(r2, &(0x7f0000003880)={0xa, 0x4e20, 0x20, @local, 0x5}, 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000100), &(0x7f0000000180)=0x4) write$P9_RWSTAT(r3, &(0x7f0000000240)={0x7}, 0x7) dup2(r0, r3) 03:17:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x7000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2014.295860] FAULT_INJECTION: forcing a failure. [ 2014.295860] name failslab, interval 1, probability 0, space 0, times 0 [ 2014.298480] CPU: 0 PID: 13413 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2014.300032] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2014.302502] Call Trace: [ 2014.303086] dump_stack+0x107/0x163 [ 2014.303901] should_fail.cold+0x5/0xa [ 2014.304745] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2014.305856] should_failslab+0x5/0x10 [ 2014.306689] kmem_cache_alloc_trace+0x55/0x360 [ 2014.307714] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2014.308834] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2014.309919] __list_lru_init+0x403/0x7e0 [ 2014.310834] alloc_super+0x7f4/0x990 [ 2014.311674] sget+0x10b/0x500 [ 2014.312367] ? kill_litter_super+0xa0/0xa0 [ 2014.313292] ? devpts_remount+0x130/0x130 [ 2014.314209] mount_nodev+0x2e/0x120 [ 2014.315010] ? devpts_kill_sb+0x70/0x70 [ 2014.315889] legacy_get_tree+0x105/0x220 [ 2014.316779] ? ns_capable+0xd9/0x100 [ 2014.317601] vfs_get_tree+0x8e/0x2f0 [ 2014.318424] path_mount+0x13ba/0x20a0 [ 2014.319272] ? strncpy_from_user+0x9e/0x460 [ 2014.320239] ? finish_automount+0xa40/0xa40 [ 2014.321182] ? getname_flags.part.0+0x1dd/0x4f0 [ 2014.322223] __x64_sys_mount+0x27e/0x300 [ 2014.323109] ? path_mount+0x20a0/0x20a0 [ 2014.323994] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2014.325187] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2014.326320] do_syscall_64+0x33/0x40 [ 2014.327131] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2014.328264] RIP: 0033:0x7f9c93414b19 [ 2014.329075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2014.333059] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2014.334708] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2014.336258] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2014.337799] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2014.339341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2014.340894] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:17:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x8f}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:17:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x9000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:17:53 executing program 3: sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0xb4, 0x0, 0x2, 0x70bd25, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0xd}, {0x5}}, {@pci={{0x8}, {0x11}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x80}, 0x40000) request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) recvfrom$inet6(r0, &(0x7f0000000180)=""/143, 0x8f, 0x40, &(0x7f0000000040)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xbffa}, 0x1c) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x83040300, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x2f, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2014.370851] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:17:53 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x614400, 0x20) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x288000, 0x144) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:17:53 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000180)={0x4a, 0x6f, 0x1, {0x5, [{0x0, 0x4, 0x6}, {0x8, 0x1}, {0x80, 0x4, 0x1}, {0x40, 0x0, 0x5}, {0x44, 0x0, 0xfff}]}}, 0x4a) 03:17:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xf000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:17:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xf0}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:17:53 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000180)={0x4a, 0x6f, 0x1, {0x5, [{0x0, 0x4, 0x6}, {0x8, 0x1}, {0x80, 0x4, 0x1}, {0x40, 0x0, 0x5}, {0x44, 0x0, 0xfff}]}}, 0x4a) [ 2014.502359] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:18:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x48000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:18:06 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 52) [ 2028.119192] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:18:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7}, 0x7) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r1, 0x0, 0x3, 0x0) 03:18:06 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x4) 03:18:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x14c}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:18:06 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 03:18:06 executing program 1: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000540)='5', 0x1, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000180)='^\x00', r1) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:18:06 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000540)='5', 0x1, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000180)='syz', r1) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r5}) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r5) add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "198be94fbb35c897dcf37f04ebd4f9f4ecd9bf010e61f00f837f8e57242cba52965f202765246dad807ffa6de0379fed4c517d5e92f64077beb89fbb4c6a4ca9", 0x3f}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r5, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:18:06 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000000000000cd9489e45b4081e33754adc71443600", @ANYRES32=r0, @ANYBLOB="03000000000000002e2f66696c653100"]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000180)=0x1) [ 2028.172518] FAULT_INJECTION: forcing a failure. [ 2028.172518] name failslab, interval 1, probability 0, space 0, times 0 [ 2028.175291] CPU: 0 PID: 13762 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2028.176962] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2028.179637] Call Trace: [ 2028.180273] dump_stack+0x107/0x163 [ 2028.181131] should_fail.cold+0x5/0xa [ 2028.182022] ? create_object.isra.0+0x3a/0xa20 [ 2028.183082] should_failslab+0x5/0x10 [ 2028.183989] kmem_cache_alloc+0x5b/0x350 [ 2028.184936] ? mark_held_locks+0x9e/0xe0 [ 2028.185888] create_object.isra.0+0x3a/0xa20 [ 2028.186912] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2028.188116] kmem_cache_alloc_trace+0x151/0x360 [ 2028.189226] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2028.190367] __list_lru_init+0x403/0x7e0 [ 2028.191332] alloc_super+0x7f4/0x990 [ 2028.192221] sget+0x10b/0x500 [ 2028.192945] ? kill_litter_super+0xa0/0xa0 [ 2028.193917] ? devpts_remount+0x130/0x130 [ 2028.194888] mount_nodev+0x2e/0x120 [ 2028.195729] ? devpts_kill_sb+0x70/0x70 [ 2028.196664] legacy_get_tree+0x105/0x220 [ 2028.197598] ? ns_capable+0xd9/0x100 [ 2028.198463] vfs_get_tree+0x8e/0x2f0 [ 2028.199325] path_mount+0x13ba/0x20a0 [ 2028.200225] ? strncpy_from_user+0x9e/0x460 [ 2028.201223] ? finish_automount+0xa40/0xa40 [ 2028.202220] ? getname_flags.part.0+0x1dd/0x4f0 [ 2028.203324] __x64_sys_mount+0x27e/0x300 [ 2028.204279] ? path_mount+0x20a0/0x20a0 [ 2028.205203] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2028.206406] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2028.207600] do_syscall_64+0x33/0x40 [ 2028.208464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2028.209640] RIP: 0033:0x7f9c93414b19 [ 2028.210496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2028.214718] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2028.216472] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2028.218105] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2028.219738] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2028.221378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2028.223011] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:18:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xf00}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:18:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x4b010000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:18:07 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0xb040300, 0x0, 0x0, 0x0, {0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) execveat(r2, &(0x7f0000000180)='./file1\x00', 0x0, 0x0, 0x0) 03:18:07 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)={0xd, 0x7, 0x1, {0x4, '[%(\xcc'}}, 0xd) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:18:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x4c01}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2028.398571] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:18:07 executing program 0: ioprio_get$pid(0x1, 0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:18:07 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x521243, 0x1ff) r1 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = fork() ptrace(0x10, r2) ptrace(0x11, r2) syz_open_procfs(r2, &(0x7f00000001c0)='net/rt6_stats\x00') recvmsg$unix(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/147, 0x93}, {&(0x7f00000004c0)=""/177, 0xb1}, {&(0x7f0000000580)=""/5, 0x5}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="001ccb00"], 0x138}, 0x1083) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r4, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) clone3(&(0x7f00000007c0)={0x8064500, &(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0), {0x1b}, &(0x7f0000000200)=""/237, 0xed, &(0x7f0000000300)=""/206, &(0x7f0000000780)=[r2, r1, 0x0, r3, r1, r1], 0x6, {r4}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:18:07 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 53) 03:18:07 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 03:18:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x8f00}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:18:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x4c000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2028.504850] FAULT_INJECTION: forcing a failure. [ 2028.504850] name failslab, interval 1, probability 0, space 0, times 0 [ 2028.506425] CPU: 1 PID: 14233 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2028.507335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2028.508803] Call Trace: [ 2028.509147] dump_stack+0x107/0x163 [ 2028.509612] should_fail.cold+0x5/0xa [ 2028.510115] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2028.510782] should_failslab+0x5/0x10 [ 2028.511282] kmem_cache_alloc_trace+0x55/0x360 [ 2028.511889] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2028.512552] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2028.513195] __list_lru_init+0x403/0x7e0 [ 2028.513741] alloc_super+0x7f4/0x990 [ 2028.514230] sget+0x10b/0x500 [ 2028.514664] ? kill_litter_super+0xa0/0xa0 [ 2028.515218] ? devpts_remount+0x130/0x130 [ 2028.515767] mount_nodev+0x2e/0x120 [ 2028.516246] ? devpts_kill_sb+0x70/0x70 [ 2028.516766] legacy_get_tree+0x105/0x220 [ 2028.517284] ? ns_capable+0xd9/0x100 [ 2028.517771] vfs_get_tree+0x8e/0x2f0 [ 2028.518251] path_mount+0x13ba/0x20a0 [ 2028.518756] ? strncpy_from_user+0x9e/0x460 [ 2028.519307] ? finish_automount+0xa40/0xa40 [ 2028.519932] ? getname_flags.part.0+0x1dd/0x4f0 [ 2028.520538] __x64_sys_mount+0x27e/0x300 [ 2028.521090] ? path_mount+0x20a0/0x20a0 [ 2028.521604] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2028.522278] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2028.522976] do_syscall_64+0x33/0x40 [ 2028.523459] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2028.524134] RIP: 0033:0x7f9c93414b19 [ 2028.524614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2028.526973] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2028.527947] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2028.528874] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2028.529792] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2028.530696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2028.531598] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:18:07 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7}, 0x7) accept(r0, &(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c}, &(0x7f0000000240)=0x80) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_open_dev$mouse(&(0x7f0000000040), 0x24, 0x42) openat(r1, &(0x7f0000000180)='./file1\x00', 0x400000, 0x86) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2028.557235] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:18:07 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x80) 03:18:07 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 54) [ 2028.659052] FAULT_INJECTION: forcing a failure. [ 2028.659052] name failslab, interval 1, probability 0, space 0, times 0 [ 2028.660483] CPU: 1 PID: 14375 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2028.661308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2028.662631] Call Trace: [ 2028.662956] dump_stack+0x107/0x163 [ 2028.663380] should_fail.cold+0x5/0xa [ 2028.663855] ? create_object.isra.0+0x3a/0xa20 [ 2028.664394] should_failslab+0x5/0x10 [ 2028.664845] kmem_cache_alloc+0x5b/0x350 [ 2028.665322] ? mark_held_locks+0x9e/0xe0 [ 2028.665806] create_object.isra.0+0x3a/0xa20 [ 2028.666318] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2028.666935] kmem_cache_alloc_trace+0x151/0x360 [ 2028.667484] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2028.668078] __list_lru_init+0x403/0x7e0 [ 2028.668563] alloc_super+0x7f4/0x990 [ 2028.669010] sget+0x10b/0x500 [ 2028.669373] ? kill_litter_super+0xa0/0xa0 [ 2028.669893] ? devpts_remount+0x130/0x130 [ 2028.670379] mount_nodev+0x2e/0x120 [ 2028.670831] ? devpts_kill_sb+0x70/0x70 [ 2028.671297] legacy_get_tree+0x105/0x220 [ 2028.671787] ? ns_capable+0xd9/0x100 [ 2028.672351] vfs_get_tree+0x8e/0x2f0 [ 2028.672911] path_mount+0x13ba/0x20a0 [ 2028.673491] ? strncpy_from_user+0x9e/0x460 [ 2028.674089] ? finish_automount+0xa40/0xa40 [ 2028.674708] ? getname_flags.part.0+0x1dd/0x4f0 [ 2028.675370] __x64_sys_mount+0x27e/0x300 [ 2028.675943] ? path_mount+0x20a0/0x20a0 [ 2028.676495] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2028.677241] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2028.677966] do_syscall_64+0x33/0x40 [ 2028.678476] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2028.679102] RIP: 0033:0x7f9c93414b19 [ 2028.679534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2028.681758] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2028.682643] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2028.683491] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2028.684338] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2028.685178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2028.686012] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:18:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xf000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:18:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x640a0000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:18:07 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback, 0x40}, 0xfffffed0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001200)=""/181, &(0x7f00000012c0)=0xb5) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000200)={{r2}, 0x0, 0x20, @inherit={0x68, &(0x7f0000001300)=ANY=[@ANYBLOB="010000000000000004000000000000003f000000000000000900000000000000210000000000000004000000ffffffff08000000000000000600000000000000ca09000000000000030000000000f829034000000000000000ff070000000000000000000000000036e7978efa536220503f3a8763bc0f5418"]}, @name="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"}) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2028.709095] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:18:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x68000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2028.758806] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2028.858483] cgroup: fork rejected by pids controller in /syz7 [ 2042.614051] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:18:30 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 55) 03:18:30 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000001580)) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000180)='./file1\x00', 0x7, 0x4, &(0x7f0000000340)=[{&(0x7f00000001c0)="20f4cb4ff5966144ddae2acfb0aef0b1066fbe08f30d0744cb1dd725ad4274ea9215ddded1467c103c8d1dc02626c69bfd71cd8ee3c84f363d09dd8d6208e3d086b8aa396b4d80198b6e08a681ef6a390d8a9ea68659cb0d6303f51ead896775addfeda9766c35bfcc04e4c217b3979cd10c02e32ab311604418dac785fa62d7f09d4b19d16b564bc43d0ef0be184c177ee1c79e458c196b2fb3465c02761679121694d781cf0f3acb883f2fca9289aff08434d7d858758d", 0xb8, 0xfffffffffffffff7}, {&(0x7f0000000280)="2f0c603dfd1c16", 0x7, 0x2}, {&(0x7f00000002c0)="52c49f8e88ecaef46ccb2eedbf1fe8b7e12e8a8302347d0100ee657fe3a71cff15887d636797649b67ff721631654cafb99aaf8c09", 0x35, 0x9}, {&(0x7f0000001500)="39af50036d8ad575edfe836b49206e1951ea769cc2", 0x15, 0x200000004}], 0x80, &(0x7f00000015c0)={[], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0x1800fed0259e6249, 0x32, 0x34, 0x65, 0x30, 0x64, 0x55], 0x2d, [0x66, 0x30, 0x35, 0x62], 0x2d, [0x31, 0x35, 0x33, 0x34], 0x2d, [0x7, 0x32, 0x37, 0x65], 0x2d, [0x30, 0x64, 0x35, 0x63, 0x33, 0x64, 0x63, 0x31]}}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '-{'}}, {@pcr={'pcr', 0x3d, 0x22}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&/@+)\\!{~*,'}}, {@smackfshat={'smackfshat', 0x3d, ',+'}}]}) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x800) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000001440)={&(0x7f0000000440)=""/4096, 0x1000, 0x8, 0x1ff}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000001480)={{0x1, 0x1, 0x18, r0, {0x20}}, './file1\x00'}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000014c0)={0x0, 0x7}, 0x4) [ 2052.040550] FAULT_INJECTION: forcing a failure. [ 2052.040550] name failslab, interval 1, probability 0, space 0, times 0 [ 2052.043002] CPU: 1 PID: 14651 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2052.044447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2052.046774] Call Trace: [ 2052.047325] dump_stack+0x107/0x163 [ 2052.048082] should_fail.cold+0x5/0xa [ 2052.048890] ? create_object.isra.0+0x3a/0xa20 [ 2052.049822] should_failslab+0x5/0x10 [ 2052.050600] kmem_cache_alloc+0x5b/0x350 [ 2052.051443] ? mark_held_locks+0x9e/0xe0 [ 2052.052285] create_object.isra.0+0x3a/0xa20 [ 2052.053190] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2052.054239] kmem_cache_alloc_trace+0x151/0x360 [ 2052.055204] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2052.056224] __list_lru_init+0x403/0x7e0 [ 2052.057071] alloc_super+0x7f4/0x990 [ 2052.057845] sget+0x10b/0x500 [ 2052.058494] ? kill_litter_super+0xa0/0xa0 [ 2052.059372] ? devpts_remount+0x130/0x130 [ 2052.060246] mount_nodev+0x2e/0x120 [ 2052.060999] ? devpts_kill_sb+0x70/0x70 [ 2052.061817] legacy_get_tree+0x105/0x220 [ 2052.062663] ? ns_capable+0xd9/0x100 [ 2052.063429] vfs_get_tree+0x8e/0x2f0 [ 2052.064215] path_mount+0x13ba/0x20a0 [ 2052.065216] ? strncpy_from_user+0x9e/0x460 03:18:30 executing program 7: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) creat(&(0x7f0000000040)='./file1\x00', 0x4) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x0, 0x4, 0x8}, 0x4}}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f00000001c0)={{r1}, 0x1, &(0x7f0000000180)=[0x4dff270d], 0x8001, 0x3, [0xffff, 0x0, 0x7, 0x6]}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:18:30 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7}}, 0x0, 0x0, 0x4d, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "1475173f74d5b75084878f059c4816c0055172760f83da4325747afca03876f5bf9d68c5a9a21a88bba0b19448c5fac9b327031b54470e23d5570b6e3561ec80"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000280), 0x0, 0x0, 0x0, r2) fcntl$setsig(r1, 0xa, 0x3c) sendfile(r1, r0, 0x0, 0x9bbb) close(r0) r3 = dup3(0xffffffffffffffff, r0, 0x80000) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', 0x7019800000, 0x5, &(0x7f0000000380)=[{&(0x7f0000000200)="227cc1a96bbada780aaff658c441a48454764b24669ce3877102b0f0b82109ae689212e4b322410db8700d61f7ad2686888c2488717f52ae64a83516db949a27cb542f6aefb630b2f7a94cdb81c8e2494767d7330e3e38c4aae661869a52d718dc3d16c773d8562bc2db47214dc0ea94aa5259916dc8685a915a546f169b869cc0329104614b73c4aef09e364450001fcade5dcb4d165081e86b0aa8d767bba5daeef49510edd0f2105e7b4e8898", 0xae}, {&(0x7f00000002c0)="e8960e13759b2aed61b7b3f2644ca164fbd19908eff3b74218035af5926c7c5e59cbc1b3971b4adf3726a7303e4886a4b05e43eef1a402bc37344b7ba19856db326fcfeb700736737e3b442df5f4b60c19ca10882879da6bd6e4a3382eb1c247604678cc033243df688898c94e62faf6a3a6107cb8a57553940f6794d8e9967986efabd630ced55daabffc85090ffed6c054e4765cbd70d86938f76bea352652b805d117f6b7", 0xa6, 0x45a7}, {&(0x7f0000000500)="ca7c10a381c0e657a2f5dd71aaae1564a44ccce4c349c9c36850d260702f20004e5c51b91be71937abe9f061f708bf9f021aadbeccf699f277e39fa9f7fcbca9a683b6af9e6aa56fcee7edaaf941a37aac87d27f43abed2a3df4b29206ae662c5402b9b8aa1ead4f9dbe50a2fbc0d5873e346821fac764ae5e5985089e272774a52f4b0a95dcc7c52c9c2a66a75ddbd55630ce236fa1cd336d3e00106df735fafc24ca2b7d103a5e6ee8cfe91b2f52ae2d8024afb7a26af9ddb19498332996e688ad17484cf6bb8cf8bbe9220cea8ffe25de1d447a86e2e6bb4d56b8eed5173394dc66", 0xe3, 0xc1}, {&(0x7f0000000600)="89316a9966e8cdba3c2a7c175a732d94a0e02c310f800e4f7be3a0b0af69d307a4636e6b3c7ec19439e1f0050a88ef555ed057715cbcd945baf6f04af1dcf7e8e2af73aeb30486cff77bb35f773e1fcbe7beef52fac4fa994ebf7c3bbe4a77dd063af56d506a173638bd7c87aa2504716d1afaa66e621aa1916bd8bee8470b237477cf86e65d0e28c0b933eb5ef0e1a65c0b484bec2407573e1865cd2938e3d3ec3d78f58d9b55b36c43836b068b1ffbb84bacc7668f4971f839a98fec8554c313dfcc08109966566a72f212614d1b8a802a2348356f1866faba6d53d3430115918361a73b4533922c2ee134", 0xec, 0x1}, {&(0x7f0000000700)="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", 0x1000, 0x6}], 0x108003, &(0x7f0000001700)={[{@fat=@quiet}, {@dots}, {@dots}], [{@pcr={'pcr', 0x3d, 0x25}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) copy_file_range(r0, &(0x7f0000000140)=0x9f3c, r4, 0x0, 0xfffffffffffffffe, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e21, 0x1000, @private2, 0x401}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) openat(0xffffffffffffffff, &(0x7f0000001780)='\x00', 0x100400, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:18:30 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 03:18:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x6c000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:18:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x34000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:18:30 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = getegid() setgid(r2) keyctl$chown(0x4, r1, 0xffffffffffffffff, r2) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r3) add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "198be94fbb35c897dcf37f04ebd4f9f4ecd9bf010e61f00f837f8e57242cba52965f202765246dad807ffa6de0379fed4c517d5e92f64077beb89fbb4c6a4ca9", 0x3f}, 0x48, r3) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000380)="d27cd07c0e04e372cdf4cd84f5cbba8745a5d77fc92fa622561d2f3b860773111a5bec2002101fdf7c34c5d84ccad297c5af7e924ddb1bb54534be0378bd1b052520e0d3ad52699e2cd1dda4042d97ff65bf9f62717d016f9678aecca901ecb41dfc4786865daba83c7c395b7680cb6ba3f78f78389476a99b03e60ef15fe5c77dd363f576e46070d36034ff8b57fef9b2e38b7e5f59c07cf92a29e13fd9fae3eb9828f73fb032253796f30ed62bce51838c0ea3299defad1efc7d9136e0cc7d2acc49a2ac61c8be2f43a63d829d99fbd66a0cb7a649114c5a118bebb91eec05191604d82ae26576a06178", 0xeb, r3) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) add_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000180)="d42467caf24936d7fa2c496943de61cf2674e02766a702a17f4af644e8cb6d98240330c552b92eb412232436f84a0fd56465a91d6338824c1b3ed8c5154b335eb2f4dc3cd1519900d7a0774bdab204bca62efae267be2cf112dc7884ebc3bc9c5b648a", 0x77, 0xfffffffffffffff9) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2052.066244] ? finish_automount+0xa40/0xa40 [ 2052.067255] ? getname_flags.part.0+0x1dd/0x4f0 [ 2052.068256] __x64_sys_mount+0x27e/0x300 [ 2052.069096] ? path_mount+0x20a0/0x20a0 [ 2052.069922] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2052.071007] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2052.072079] do_syscall_64+0x33/0x40 [ 2052.072851] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2052.073897] RIP: 0033:0x7f9c93414b19 [ 2052.074654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2052.078483] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2052.080071] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2052.081582] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2052.083062] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2052.084551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2052.086038] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2052.108125] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:18:30 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = gettid() r3 = getpgrp(r1) kcmp(r2, r3, 0x2, r0, 0xffffffffffffffff) [ 2052.132839] nfs4: Unknown parameter 'fsuuid' 03:18:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x80000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:18:31 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) creat(&(0x7f0000000040)='./file1\x00', 0x4) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x0, 0x4, 0x8}, 0x4}}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f00000001c0)={{r1}, 0x1, &(0x7f0000000180)=[0x4dff270d], 0x8001, 0x3, [0xffff, 0x0, 0x7, 0x6]}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:18:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x74000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:18:31 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x8, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2052.298081] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:18:31 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f0000000100)=0x8) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0000000043d07361bddd7844eccd4936"]) clone3(&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0, 0x0, {r3}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:18:31 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x2}, 0xc02}}, 0x18) close(0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "198be94fbb35c897dcf37f04ebd4f9f4ecd9bf010e61f00f837f8e57242cba52965f202765246dad807ffa6de0379fed4c517d5e92f64077beb89fbb4c6a4ca9", 0x3f}, 0x48, r2) r3 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000200)="b3accb1f09c87c3d9cb769df0cd9251e", 0x10, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r5}) keyctl$KEYCTL_MOVE(0x1e, r3, 0xfffffffffffffffc, r4, 0x0) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000380)="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", 0xfd, r4) clone3(&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, {0x3f}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(&(0x7f0000000040)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000500)='cpu.pressure\x00', 0x2, 0x0) 03:18:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x400300}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2064.131508] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:18:52 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 56) 03:18:52 executing program 1: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000540)='5', 0x1, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r1) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="5e30c0d2f886d1ba25556f8e74f8a5e38e677d93539cf15f705d69f4efed", 0x1e, r2) request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='asymmetric\x00', r1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:18:52 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r2 = fork() ptrace(0x10, r2) ptrace(0x11, r2) syz_open_procfs(r2, &(0x7f00000001c0)='net/rt6_stats\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) stat(&(0x7f00000014c0)='./file1\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000100)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000000180)="f0e4e83e4e72d0d17e31edfaf7b923e36c4394adb0766a7c9ec16a1eb0ff9aa4703366830dbe52822a47096ee61b194b4c17fe9cec1bcbea7ab83a513842e38a1d0bdcb83b495bb659c46c71569c2b7390d8e5dfc04591ab59861ec107f9cd3f5b8daebd33a820259c87dfa05dcc1e1711bd7f3d077d31ccc625c1cbf2f84980741169efdc1c81b8795fed338362bc454c550dfdb5297c592e282ebfe57eaea639c895ae2267e981c4ed9d55234824b6f372f167865807e6176086aecd758d74a648e1578c465a2cce9e94a41465550dc92985b9b19f43451c0d93a5f7a5efb861e5732ec0c93305c161fd750ed72a344900dccbce8c623a28e82080", 0xfc}, {&(0x7f0000000280)="0639a80c6e10b7a79f373bb51fb3205b45cc53ba7c8d3036e83be12d26b862b9a1bd8e082d3737a4324bc9e91031304c7b5055e635062910385ad93c9f4244270557d8b8ea2ae62f161731fe9a87186e1f4b7bbaac1bcf759a0d88c985098a7eea04f98f54120be39a6c4f0708313c21c5e4c3bbd134c3cc0c859d94983b23de49c5a5bc959d43219e3642a1c698deed4bf6630bbc1e47edd7a062b3919eb0b6d671cab06d9a23865e0898665d06e60ac74f28c11fd2129b7b3f0e56c2e0de20b12caffb", 0xc4}, {&(0x7f0000000040)="7351d1d7b9a5393a99608f02f6fa5c32cec99030d76cf7a1bc95b41f0ef3df76c252fb3738ad1feb0a9b0b4264", 0x2d}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="773bd86f67c236dfc252a25d5c553802d40357ccab85fa639dd14b4e3ee98de9f9f22be48242466296d029f8a955c36fee439ea5aae1461713d73bddb7346f6bb86f2a899dbfd93771bb313d4197c41cb74d56912f3b2b503339e28ec840478936e5415b6af4199d5db2593302a491e76bda086ead7b1c32865a3d4aefd827bb5b", 0x81}], 0x5, &(0x7f0000001580)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r2, r3, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, r4, 0xee01}}}], 0x88, 0x20008000}, 0x4004) 03:18:52 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x7a000000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2073.598384] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:18:52 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 03:18:52 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x8, 0x4, 0x8}, 0xfffdf7ff}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000380)=[&(0x7f0000000180)='[\xe9*!\x00', &(0x7f00000001c0)=']\x1d.)\x00', &(0x7f0000000200)='^[[.\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='[+\\\x00', &(0x7f00000002c0)='&\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='D/^,.*-\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='+.[}\\@**@:\x00', &(0x7f0000000400)='/\'[^\xa6.).*,+\x00'], 0x100) 03:18:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xf0ffff}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:18:52 executing program 3: request_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) clone3(&(0x7f0000000080)={0x901c00, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:18:52 executing program 1: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x195) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000780)={'syz_tun\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000000180)=[{{&(0x7f0000005340)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000c00)=[{&(0x7f00000000c0)="863c53142513ecdb27a6ab07930037fea1b95edd0a793e20f16d4bdf58466bfcdeabfaa8fae80ddc04eda5586968093568c97afd96e7a0ba5ad491c36c3ce1cdd6b93e6754850640bc5549a55850a142c2b717ff133f1788e2f6a77b27a2e152e2f9bb44f02bf709a71a95e3846188dd87c8615eeeed290bd7fc6b", 0x7b}, {&(0x7f00000001c0)="750285df52d84f62bd50d36115b28f5d4381a38f2a3b2084d1cbf91d8eb46140fd2ac11963561d29d796e90c463746fe5108a3e6f57ba77d67dae81d0efefc12756faf8a5469e43bc19d4c5601c01d06e8b598f97062c3891e8729e62fa3a57b5d8c4c30c109ce108e0287a8cbfd5daf0dfc5fd350e287849a54b8057e9bec9d5e7c45183e5619f539db85c04c27d1e03a8cd46e128ba62c158874e38913a72d70f72c9163967530217b8331630bda75e49d73c7561a5ae381b287ba14bc176b28e8db339cae1350edff2caa23746a9873355128c2883028956f225759f5fc0169ee6e", 0xe3}, {&(0x7f0000000c40)="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", 0x453}], 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=r4, @ANYBLOB="ac14400000000000000000002800070000000000008d000007000000070f7c000000000000520649d2cec7b099b257bbb0d6fae6debd50098df99037d21ffba273f56c72540000880ab501c873920d8d59a5c3824b72d487d8a1cfae642cc3a5943ed70b8a5d0bcf98f9969c94ff559f9e8cc7febbeffd894325cf964dd0188ffa7ba57983acd6322a5433"], 0x48}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@loopback, @local, @dev={0xfe, 0x80, '\x00', 0x41}, 0x2, 0x1, 0x9, 0x400, 0x4, 0xc0400009, r4}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) recvfrom$unix(r0, &(0x7f0000000200)=""/126, 0x7e, 0x101, &(0x7f0000000180)=@file={0x0, './file1\x00'}, 0x6e) statx(r0, &(0x7f0000000680)='./file1\x00', 0x400, 0x8, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000005c0)='./file1\x00', &(0x7f0000000600), 0x4, &(0x7f00000008c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@loose}, {@fscache}], [{@euid_gt}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@permit_directio}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, '^'}}, {@euid_lt={'euid<', r5}}]}}) execveat(r0, &(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=[&(0x7f0000000380)='(\x00'], &(0x7f0000000580)=[&(0x7f0000000500)='\x00', &(0x7f0000000540)='\xd2^\x00'], 0x1000) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x111801, 0x0) pidfd_getfd(r0, r6, 0x0) [ 2073.657592] FAULT_INJECTION: forcing a failure. [ 2073.657592] name failslab, interval 1, probability 0, space 0, times 0 [ 2073.660221] CPU: 0 PID: 15125 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2073.661710] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2073.664085] Call Trace: [ 2073.664668] dump_stack+0x107/0x163 [ 2073.665450] should_fail.cold+0x5/0xa [ 2073.666248] ? create_object.isra.0+0x3a/0xa20 [ 2073.667215] should_failslab+0x5/0x10 [ 2073.668030] kmem_cache_alloc+0x5b/0x350 [ 2073.668912] ? mark_held_locks+0x9e/0xe0 [ 2073.669798] create_object.isra.0+0x3a/0xa20 [ 2073.670723] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2073.671800] kmem_cache_alloc_trace+0x151/0x360 [ 2073.672814] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2073.673851] __list_lru_init+0x403/0x7e0 [ 2073.674732] alloc_super+0x7f4/0x990 [ 2073.675541] sget+0x10b/0x500 [ 2073.676204] ? kill_litter_super+0xa0/0xa0 [ 2073.677119] ? devpts_remount+0x130/0x130 [ 2073.678001] mount_nodev+0x2e/0x120 [ 2073.678779] ? devpts_kill_sb+0x70/0x70 [ 2073.679628] legacy_get_tree+0x105/0x220 [ 2073.680501] ? ns_capable+0xd9/0x100 [ 2073.681298] vfs_get_tree+0x8e/0x2f0 [ 2073.682087] path_mount+0x13ba/0x20a0 [ 2073.682908] ? strncpy_from_user+0x9e/0x460 [ 2073.683844] ? finish_automount+0xa40/0xa40 [ 2073.684790] ? getname_flags.part.0+0x1dd/0x4f0 03:18:52 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x9effffff, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2073.685801] __x64_sys_mount+0x27e/0x300 [ 2073.686783] ? path_mount+0x20a0/0x20a0 [ 2073.687647] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2073.688769] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2073.689859] do_syscall_64+0x33/0x40 [ 2073.690645] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2073.691736] RIP: 0033:0x7f9c93414b19 [ 2073.692538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2073.696394] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2073.698011] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2073.699527] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2073.701032] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2073.702535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2073.704035] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:18:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x1000000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2073.772764] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:18:52 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x40, 0x3}}, './file1\x00'}) readlinkat(r1, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)=""/148, 0x94) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2088.049547] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:19:14 executing program 1: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x195) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000780)={'syz_tun\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000000180)=[{{&(0x7f0000005340)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000c00)=[{&(0x7f00000000c0)="863c53142513ecdb27a6ab07930037fea1b95edd0a793e20f16d4bdf58466bfcdeabfaa8fae80ddc04eda5586968093568c97afd96e7a0ba5ad491c36c3ce1cdd6b93e6754850640bc5549a55850a142c2b717ff133f1788e2f6a77b27a2e152e2f9bb44f02bf709a71a95e3846188dd87c8615eeeed290bd7fc6b", 0x7b}, {&(0x7f00000001c0)="750285df52d84f62bd50d36115b28f5d4381a38f2a3b2084d1cbf91d8eb46140fd2ac11963561d29d796e90c463746fe5108a3e6f57ba77d67dae81d0efefc12756faf8a5469e43bc19d4c5601c01d06e8b598f97062c3891e8729e62fa3a57b5d8c4c30c109ce108e0287a8cbfd5daf0dfc5fd350e287849a54b8057e9bec9d5e7c45183e5619f539db85c04c27d1e03a8cd46e128ba62c158874e38913a72d70f72c9163967530217b8331630bda75e49d73c7561a5ae381b287ba14bc176b28e8db339cae1350edff2caa23746a9873355128c2883028956f225759f5fc0169ee6e", 0xe3}, {&(0x7f0000000c40)="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", 0x453}], 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=r4, @ANYBLOB="ac14400000000000000000002800070000000000008d000007000000070f7c000000000000520649d2cec7b099b257bbb0d6fae6debd50098df99037d21ffba273f56c72540000880ab501c873920d8d59a5c3824b72d487d8a1cfae642cc3a5943ed70b8a5d0bcf98f9969c94ff559f9e8cc7febbeffd894325cf964dd0188ffa7ba57983acd6322a5433"], 0x48}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@loopback, @local, @dev={0xfe, 0x80, '\x00', 0x41}, 0x2, 0x1, 0x9, 0x400, 0x4, 0xc0400009, r4}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) recvfrom$unix(r0, &(0x7f0000000200)=""/126, 0x7e, 0x101, &(0x7f0000000180)=@file={0x0, './file1\x00'}, 0x6e) statx(r0, &(0x7f0000000680)='./file1\x00', 0x400, 0x8, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000005c0)='./file1\x00', &(0x7f0000000600), 0x4, &(0x7f00000008c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@loose}, {@fscache}], [{@euid_gt}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@permit_directio}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, '^'}}, {@euid_lt={'euid<', r5}}]}}) execveat(r0, &(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=[&(0x7f0000000380)='(\x00'], &(0x7f0000000580)=[&(0x7f0000000500)='\x00', &(0x7f0000000540)='\xd2^\x00'], 0x1000) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x111801, 0x0) pidfd_getfd(r0, r6, 0x0) 03:19:14 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000180)=""/255, &(0x7f0000000040)=0xff) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_mount_image$nfs(&(0x7f0000000100), &(0x7f00000002c0)='./file1\x00', 0x100000001, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000300)="a45935784d24b101dde5ff0b8091728eaa3d881e4e900004de722fef5c42775a1e20be172b7f1d3d66a1bb49b1d9abe653df296474bf", 0x36, 0x4}, {&(0x7f0000000380)="6aa9e194f049a737c36448125ca5248a4ba57c0e3dab7b07a623212944612a9f898ea6e359e1d66276ee26c4acf77eb44ca335450fbc724971a22c305a4f771b126b366945a345c83806071f690424bc20fa25853c196a806d6243aa48ebd2bbf2fd90888d88c3322f84ffe675230f4de1", 0x71, 0xfff}, {&(0x7f0000000400)="1cd5aeae9154c69df7f13dbc23613f5aa4a34bf4932b8ea8cef2994fc17c5a56f29e9e42252248942bf39642d54452ea6a2e06b518ad1467e6f20faeff9da5cc0a2c41162435c728afbbba10addef3cb4fadcab8c39e81f6a78f5b37b8585aaa06a5fe1eca831559bfe520916d5cdb51af4e8abc58d9069f6275900234fd41097a3dd936719ccd3f655388b9a838aa28e2c9b615ee751c53e9ad053adbfda09d2f28e9acf86570d5c06b7cd7f2093ceafe8f91367647e9e071b7ffa5f1", 0xbd, 0xa60}], 0x198018, &(0x7f0000000540)={[{'rxrpc_s\x00'}, {'syz'}, {'syz'}, {'syz'}, {'*-^*('}, {'syz'}, {'+/@'}], [{@hash}]}) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10, r1, 0x81d30000) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2096.001280] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:19:14 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 03:19:14 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001200), 0x40800) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001300)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xff}}, './file1\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r4, &(0x7f0000000240)={0x7}, 0x7) r5 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r6, &(0x7f0000000240)={0x7}, 0x7) io_submit(0x0, 0x8, &(0x7f0000001780)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0xd874, 0xffffffffffffffff, &(0x7f0000000040)="f199646d61708b982e577af5cf6565711900442b6be13db1ce060b6bb60c916c3421", 0x22, 0x6, 0x0, 0x3}, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x7, 0x40, 0xffffffffffffffff, &(0x7f00000001c0)="de3fc66261e6a6aee94d7346ebe427bc5819946f3acb87047f801d9d87f53a4d2e02237ab0b6d45fc9686adf8a60a892f63f4f0344aa82815d9152af650813d94ffd0a659fc809cbf2d24f801fa6ebff178bef56adc4f5234f54d233a309d7cffb9f7df947a232f2f8356c1634936754351319299b753f1628a9de1a53a0278fd9fe53b8f0986c400b0160920ee25a18486e8ac24552487d43745f4aebc7d6345d58b8a621ef77aedc18268690c25152f6993c4b10265b3214721ea7bc4a0f141563940ae2e13b2de673addad190d65b6d765246c9dd5be83238b30f843c0a24904ddaa1fbb139712ae6ec3e016099de7ec882f57035d073f5d0b33fa77e132b0eb9621bec31bf6c216200b9d36c4615996cf893bc6f82c71b63d69cf403e03e1c4fa9ad44afb84c70aad2ddaed5ff664f24a2c2d6d3867657bca2cdfc8a989babc56d58069510cbf230bb893ce240a29d835d37280089a8e18e1d58d88edf2236b9be8343f8f461af96389f5e59f9b3b70d2faf6879cc1e4f94da754288e50eabe27c7fab9ba14fe9d5cf358275792ea84ae4fb017666fec75dca59a1160881af550beab7d1c0549e5d9a5ae65445e428ac620fe9b9b34784ee395034973a46a5c43d5a79588ef5fb3ab6da06598f734f48d27b40ac450064b872eafa991f0ca072d6471e9f858ddc6fed3f554cf6b979b86db6014f6a3fd282663c79bb205000457da7f65f8ef7f26faeb866f5aeb7703dde474870a1f7fcbff2dcec6162e049be8ffb644005928bcf0ebe434149bdd6f9ee3d347052438fea7f0e97bceae950a3d93518ac31e5f25d42ccc55ab8c1b4b11747da134585ae1c917de2392d1fe164e6be1dcfae73f555d4093c004a383ccb28f84fcafc74e1cc33c09598a727b5db88df663dd99587ba7365d5ea1adb4dfbe5c12a2d1cfee03b85353d954fc92cb3af84c40b4158d117deeaff8d16200c9eabb8aeadf50fa870903d63bd234084a5a5a9b11cabac7cf0056de49bec6f5abfeed8cfb96fb79fda55097a2de96972a201c213aced5001c44b80cd54b2677a2a341c99671cc9013cb9d9072b815311315f8ea679fe4758f809f6ffcb0d17e93c908dce5191a26a10166b03750ac31a0447c129839d876ba999c46dc3bdd0579c0558d8c02838ca3fde92fb4e65da0bb19ae9ef6de17c297c29806e309a69b2d3994a6be82026b5a59ce94ad886c77b16cd0478997f66e7aed565ea284fc68bdaf7a32e9f96c9d6cbf1c90d1d3e6788e5796da707176c1eb4aae29594fef64b589e5eb3edb430512a8770ef6e86c6a1bb53ec573af90f2f9cc4c1177d38ed4d89ead8844db323e6ef6fb678dfb04dd9ca22efb0a30ea5a5e010ef975c71db4eb3550e227e3bfb40566547f5c9a99751d73e99747109588c6e0fd77ff45c92b4569e023879abb4aecc1eed97d5d561bd8614ecee59bbba269c969f2d4c10a9ff7341494859c0823591493d8e3912b3dc26960ae65d478ddd20eb1cc592e9590cec7f876e6e840240dd94935e8cd05d422ee324f85e4e04a7b77f34dff107df9378689c3959adb4ff90b9a23b8f819aae2f7b8fa9fae01296645e03dff98ff704595d15741a917c26da8bc2c74c0998851ad55ce334322298e48a350b57db15617623addefa4aa7569dc2419e7f7e4f9a258db60be4d2a78d94f74dcba7303a78b9022dff9dbfa72bc119a7fb459d1951334808a732c0a878bbf8acb7c318ec1801c271b9ac17f072d9a0a5873f8427b7d692bb4cfb13c2b6b4bc3b3210a5f792379968c79170ea9311a34d6dcebe894564da620d7ad17ccc8cb61d7badf6e100693ec399e468632bb7daf95d518c944ea51cf366f3053c723afe2dd97aa86c72caff66c35514e6673329664aaefc5bfc0dae93335bbf86c68b5d61e811f44b88774a7c8b15284f406091866060451811f3070e1638a005ac0887b86e49a66bd73fbd49e13a9d4a23accf6179eabcaafb4b1b869912a1fc25bf9ef885841d60358a73ae1d0b6dfc61777785837031e6c7fc60121bc07774247f1e317238e93022346ff99f2c0b884d297e4125516eab5045bd7bc77f03a756012703cf4a0b29f349d676a73dfc97746a8405c9f52ba0d2926f6a78d11935a51cbb363a8536cf7f553545a8002b65ed3e24abaab9d647b2e523f0a2c0a0a08658d3bbcba5bc0b122f3c5fb0c09db86c3b432efd2bfacfab2258ef66a8890e433ca67156cf2cdb47a3b43f71a1ef4693d882f4f78312fa44b16473d8cdaea154770aa85ba740b1b29a10e70cdf106e52e479f437bd72b1d19d6339d646cf4febd600bed37009458b523d4f68d6bad697f54616f280fc82926d49a3a628c77a6a0fc995f46243c8967bd289f51e14e2d9ba53fc8456e1608e18ae6c0d6b1014b4e0ab56778b50c55e2f999a6bc8747605dd2259c0f3d2975f9dc318f3803fa1ecac2d5e3bb5487205ae5a329559fb2a81e1c4ee50d9e39144c9a5baabd960957cfe9f8f5da40b8c16f53f4d65c3796fd3685e59b6b8d5d1f50d0b40297aa8b9fae48bef53daf34e00b513238d6268cc61a0ffcf0068be0d3f5a37e4917169157364e7faf2151813d16e93129c7d98fce8e4e12db1daf6e3b1da5f003a8464a5fa4f14b5049d7aa431dd1a2b0448b742b2f8c47877193085158dfd1d61de5bdcfa0902f4a22d9f731a1060fd1d3fa9fb06c5d05e105f0458eaa845a3436e132d1096231f919aed6f4d91d40df9ba0e2fad94751343f1be40d6450e06e5b4a4db6d371b3b0d79a169d7d9953a8135ba507545670bb7bca362b8663eafd20cce207f8c9690a2665fa9d61ce7a45390ca634ebc0da648f76044be2035f444375521e920d949726d39181cb777c3c518d6c10cf48423008e8ad28877085a0edc379deff199d0919fe8f7056407ab6c3502f5e37826b141c2864494bd30dba2910abfcd89a3cf1a0c91b25715d1df228e08dd7ff86ab1f01db5eba540d90ce3b5b33e18a31a1cb3e7aa7638e61f070166e952e31efbbe6edae42c8a54cebdeca5e83e9a86b38f1d332542b552ecaddefe97c7183e38ff209dfd4b9673ffc6a5a74eed37ad37272d3c3a4cfc9fe7b64533b4a606928a1ba3a3953220b205acdaa75b63a6b83dd0bb84a270dbe62c1ae5f522f7c0e72c53f8802a72063b126b805185a52776043a7bc1012fb5f5b6a6858ce26616c5a388119fe9f11720c08dcd1b0b3572175102088cc0f6bf90aa2a1259192fdb3d1d5e9f53cec731cb24852ed62c8aa2b84afbae5153e9022211742382523c7a114b59c464364895c87dfb2babd6efa110d761678a358cf2eeefc6349dbc8ca19177f4a8fe9dd57bfdcf7cb9822385dc1f87c756fba9cce1e58e3ecf5d2587a677fcd0d588b89f8444264982aa1fe4366f0e4e996229e4e29e775c1f55724ade9a56b3f8dc41649ded367e1f47140a2c00382a1439b0ceb92a859c443da336d219dbe8022420ec265b9f223baad8aef51a488eb81d48c60f3add0af492e90e5b6b30b4eaec0ab7fed8048df941d21d00c3dcce8198f4458266382fab2a4c8b6bf8d4149a8019ecd8fb98fa1498baf3fc3ae53422ff0f3783eb2dba48dc4bb9cae82b95f3c6cc973bcd978fdfb6358767f7782bd740bda6a1c705a5bbe927a2d00ac302b852b30c5040d1e380f2a3d1c910a2edc0230e0d657c6dd18bf60f25abafb62059c7cff3ac27e234fd89bfa5ac7adbe962e117b98df3c095948f442f7960438856e0cd3243e9409c1a06fa14793f478e70bd80be048bef937e859f025c5c20501120a6bda212791aee291440d4816970bf898f987a6ecd590c2725940296b12947ca25560f93366952f87cbcd9ed358fd0ac9b59d24663a18825fcbccdf1d9b6699d4ad31bddf7cab0ddd084950efa4ee70f2ec00aeb86e28c9008ea5c38c2fd6b7ee38bb9822dddd7f9178339a2200251d5cd158bbfb1de2dc93fc086865588d7b8312fe988970862a43ff17207b9e61a9537a87d68e87c8502aef56e934b71ac02b3c3e1b33285f6408f4f18d4443fc3ba82680106e757706358ba976c98b48daa15262d250a3bed972b813cfdb1bfac1abd8e845752f58e16b99be3cad97b3d30a94884b278ef6cc11ae7e8c45cf2d9a9cacf54555d631f6d437426c4990cf3a605158682861b3f5574411234be87db46ac99ac92d8adb8aab6b5d14b76126f5d5f0a954aea86db2fad02b48a5e0724f196063c9dd206c677802233d6be0a17894c1f9df98fe54ba709322bdc40731892812c71933a171f2228ae1eebc2f22b2974cbad4169a52aa09b35eb9563d7361c4c9db53f1e721b7a2fea9c148b222671c1f3712be2ed88057735dbce140ea6207f406ac7938c9a4cb39b5da3bba3d2244d368081f5e2bd5720afb84b61cc09a048352a1ae3deaf43ccfa47ede9dfc0dda65b639a00fbf02a5754f47ca1bbb39ce198115ae052173851f6696893a58679b1f95c1be731abc39d20925bf5b1bcfad64a0f8a5734d89363ebf1acc615458cb61a102638de55c23f0d85c9b25a3001b36b92f45412114e7a20f1c954174eaa3a59c18fc6d63777506230ad35d8f38617edfe56e07e16205f2662f712b4e8f224daf07c3aed0dc18cf9627b652ec8984751aa8d8c0e6bebaa668f4b2c5193bf50233feaad28413462fc30885c817cbac2ee3a7b9a76cd50359ecc9cbeaaa25b735b30eca8706a973609d7d2a45bcfc2ca9339d4cd6a1284c24526b5857dabf1f39a1e6291436a6ad049aa58f1a3b301e5572207648272c6427ce87b48cc4aec2b01b757f8bad7c7c6059d68f03ab48df3321b15782ec42febddda4a057874e4ccca21a96342f7572ac3fd224fad3abe212f6144976c345ab90cb3decda1b36fbeb8fe420f4e7467e27cbf36ec8acfc7f4b721f77da842ad7cd67a1e7d40044527e1919c2f41aa3dd0b71ea38800320c38beb0138455ecf012332d092972089dcf9b9f77454c40310747eabfeaec5eb3c2792f4ee0595a5036b2befc8858d4ceaeced431a8cc63df2dbd9a4dd307983f58fcb5189866d2f7e93447a69acbdfdbc45838240175a67a52e9282aa4e39c3962aff903f26fe8eaba6ae095dcbce41ce1688dc9ba18121cb7ed2166299d102d1d652e5879b1659218ef356c4a1ccc27cd93998bac8e230efb2d114b537fe9978ae140d6ca133407b1631a288a17ab7581645efd0200333c64c7acef58ab99f3243691b435fd8eabf38767b8c622d288f4a2b0572755c35409725714aad742fca5e8d2e121bf9240622a6aa815ac677622585222f36dd3990270521bda30dce5de393c71ef4779fb33391fb1480f7ae30595d9974530188a11a58e22bbe66cdfe8df26f6ab1edfa41cf9f4b0d52f7814ced29f682c361b995ebb7b7056b85a883940c22843ba1ade001e86ee6522b2d299198b7ceecfdd225a19e27d7e8e52f6c8c3ae18a3189506a0b5e13bdf8dd5c013532c34f0ff3074e41ce545c3a5542b6e8bf61ad72504bd8246394eb8bc5c60505d50dc80bbe5c78f487792eec7d68e15070e33027ade58acc7c9cff6f5da5cf3bbcee94635ab6b118935be835ad97609bb392b671585f6818b7d316c049c8c8d439922f79f675ef49ddf585c7923b7e016aa15d9991b05d0f1ee9fe1f5c46dfd5d40ca9bf8875846ff925ae3ca3a5aa93d6dca50b89dbf77dcbb58944e14a8afffe29fb3e79fa4bf305c6e5f83cd9c1267da71037a8ad296c4835cc46e562b97e72135451f85c220db2fe03ba4f76dccefca1c116fe4986fd8daf8b05afe826aca", 0x1000, 0x101, 0x0, 0x1}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x8, 0x8, r0, &(0x7f0000001240)="4b506727a2186e9e987302fa42bc9fe63b05317a1d940d5650fcb55c0675e84253b2cefcd7ee125dcda39be64e2c10a9a8f43142d5f26eb2922e3d0cedbec0592e1f65d6f11e127a6876bade9784f3437a313ce4a3f1a6cf7d31baf2bc9c13d45d32804e290a2a7529a1f14a79a257a3fda71732e23d411eca8d4e4f3e330aded00038bc60271d718e40bbbf073b", 0x8e, 0x6, 0x0, 0x1, r1}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x17, 0x200, 0xffffffffffffffff, &(0x7f0000001380)="dcbca63bcd3ae4e82b24b4d10a1e6a7b34806ae17340ea64d196e4aadef15c671500b85ee51244876596423c4afaa0520f6bd9abce42aae4ae22a3136f26f8", 0x3f, 0x0, 0x0, 0x2}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x2, 0xca, r3, &(0x7f0000001400)="e3fa5f250b2d25dfe491e10e1ee956d06720baa26bcac72eadc9c9da5004444d7905947a1899b32e005238df7854a4cd89d19a7305fba44000d690813df49893444fd3949029d3fca9b64153d061e2a4c14a83ed195958630913e858f1886a73b318f9ebace660b2330a72fe0d809852a17a70f77780f4c829cd18a2c939e61b92fc573e418353aa86b16d4aa4d8d173981258c8756aefb29f846394c80c8dffd79077817316af039f6160f3ab3f418730bbf558dded55b4a92fac64228b3f0f9868d8b7daa9405ab3", 0xc9, 0xe855, 0x0, 0x1, r4}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000001540)="64df6d7cee4edc9ac68c30dee452823b6ab2757867c5eff01f83aab80bfbfdedd717c466", 0x24, 0xfffffffffffffe01, 0x0, 0x1}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x5, 0x5, 0xffffffffffffffff, &(0x7f00000015c0)="3cdc30e97dbfd248a399a8c6c7e4eee3333148a4860b59b65a80708377f3bfa7c17e0223a60de5dd4e6c86efed3cb1bb726a505fd27af01d8bd35327efe99cab4bb624cf126fee493efc2ec579ec4f007abf7f0b2c92caf2dcb855fd134c63cd143b819ccdb5a322448982374f8eaa026b64db0076e310950e139f9fff7f1462c9d38f846ba534b0972106d4c111a37d656d3cd417fd54722f19ed7a8626581b522df3c9de3e653470faa47e", 0xac, 0x1, 0x0, 0x2}, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x8, 0x20, r5, &(0x7f0000001700)="1726dc1c87b7896c7714f19c8b3447862c6835dc71e7e15ef32faa56d2ff7cf2a0cab6", 0x23, 0x6, 0x0, 0x2, r6}]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:19:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x2000000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:19:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xf0ffffff, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:19:14 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 57) 03:19:14 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x2000004}, 0xbfe}}, 0x18) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x18000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) clone3(&(0x7f0000000100)={0x3040300, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fork() execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2096.042572] FAULT_INJECTION: forcing a failure. [ 2096.042572] name failslab, interval 1, probability 0, space 0, times 0 [ 2096.045189] CPU: 0 PID: 15470 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2096.046600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2096.048916] Call Trace: [ 2096.049461] dump_stack+0x107/0x163 [ 2096.050202] should_fail.cold+0x5/0xa [ 2096.050982] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2096.052027] should_failslab+0x5/0x10 [ 2096.052803] kmem_cache_alloc_trace+0x55/0x360 [ 2096.053727] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2096.054764] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2096.055768] __list_lru_init+0x403/0x7e0 [ 2096.056630] alloc_super+0x7f4/0x990 [ 2096.057402] sget+0x10b/0x500 [ 2096.058046] ? kill_litter_super+0xa0/0xa0 [ 2096.058912] ? devpts_remount+0x130/0x130 [ 2096.059750] mount_nodev+0x2e/0x120 [ 2096.060480] ? devpts_kill_sb+0x70/0x70 [ 2096.061293] legacy_get_tree+0x105/0x220 [ 2096.062118] ? ns_capable+0xd9/0x100 [ 2096.062915] vfs_get_tree+0x8e/0x2f0 [ 2096.063695] path_mount+0x13ba/0x20a0 [ 2096.064497] ? strncpy_from_user+0x9e/0x460 [ 2096.065409] ? finish_automount+0xa40/0xa40 [ 2096.066315] ? getname_flags.part.0+0x1dd/0x4f0 [ 2096.067312] __x64_sys_mount+0x27e/0x300 [ 2096.068158] ? path_mount+0x20a0/0x20a0 [ 2096.069003] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2096.070092] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2096.071170] do_syscall_64+0x33/0x40 [ 2096.071948] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2096.073043] RIP: 0033:0x7f9c93414b19 [ 2096.073825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2096.077631] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2096.079220] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2096.080698] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2096.082186] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2096.083661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2096.085144] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:19:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xfcffffff, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2096.165406] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2110.355333] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:19:36 executing program 1: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x195) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000780)={'syz_tun\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000000180)=[{{&(0x7f0000005340)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000c00)=[{&(0x7f00000000c0)="863c53142513ecdb27a6ab07930037fea1b95edd0a793e20f16d4bdf58466bfcdeabfaa8fae80ddc04eda5586968093568c97afd96e7a0ba5ad491c36c3ce1cdd6b93e6754850640bc5549a55850a142c2b717ff133f1788e2f6a77b27a2e152e2f9bb44f02bf709a71a95e3846188dd87c8615eeeed290bd7fc6b", 0x7b}, {&(0x7f00000001c0)="750285df52d84f62bd50d36115b28f5d4381a38f2a3b2084d1cbf91d8eb46140fd2ac11963561d29d796e90c463746fe5108a3e6f57ba77d67dae81d0efefc12756faf8a5469e43bc19d4c5601c01d06e8b598f97062c3891e8729e62fa3a57b5d8c4c30c109ce108e0287a8cbfd5daf0dfc5fd350e287849a54b8057e9bec9d5e7c45183e5619f539db85c04c27d1e03a8cd46e128ba62c158874e38913a72d70f72c9163967530217b8331630bda75e49d73c7561a5ae381b287ba14bc176b28e8db339cae1350edff2caa23746a9873355128c2883028956f225759f5fc0169ee6e", 0xe3}, {&(0x7f0000000c40)="a3a3b0812cb089c75f18bd2b4f7cc1969e1df0fa36573fd75818485d031787eac887206ede54c99965388c77e2a6918cc9e29c3e63f91f66c690304714da68b5a0ffac527978674246399a0cd5f0cbebf3c6a9be82bfcadc3f5af3233e30b1aa1b018318679cdfd61d2cc5ffbfb0937b4b5089d065bff12b0d5255cbcde5b03ba33a70627be3043ec54647caf2461f20ea0648e818ef8494eb53881253cbad6d687e3cc9219abe89df8a91b873e55980b6e9ebee4ae01665aefe1e91110b62536e3401e47b824f955b8283381c75f712119e5a26569181a77b316a0081e09f890e8655661d9a297f7d1aa11dca45b66a9a757b9865db451ad2b214f971a53c829c1c04bc16ce5fedf534ff0ba7cd4b6116e2c4a1ef7790e10dcb159bd74a25bb7fabf9f5e7dbafa93f624eb0277d141dd169417b426f1735d546066230210de511cf225994ac9e78b667d2f2ff2cda7cf4b7888f4820f48ee4278b7c069035bb16ebcf50d918a34f3dc7387beba08ea097440d5a14d36cedba922e4adf1289e3dd09a05d317b72818850d4f95af720d1bf7405697f0a97667ec37108e4559c3c4ac19d31f55e27cb923d5c2bf9494654ead05824e73099ba9c54fa4142c84e3ebb788738454ba0346b97b4b78b826d25dd8cbb2bcaab25f411b90ed069dd7ec623a0a0e1ce228fdf56892dc9d4d2c2270da9da0e6b9b36161cdc97e635099bcf60d4510159b10317fb0d3fe8688330e2afb1a5789f9fe2061b652c2c9d0b64c191385e47d353836b57f26988632d64809f015e81affc98c715674a2ae3c32c286dbf696d2665e382ce497c588af2a93d0ea73f45b1eea19a7a2056416156c97e20afe563feeb25a946b9b3a438b440d2e853a7a253dbf9c727d3d806e506a819effc6786253c93738a5728b8b3ecaedd6cd126460910f0709e52c67a47045651e13911b998e8d4c3acc1d06bc77fe2e64cde9f19cf47f9af409002f3801ff1bf3b662586619a5baaf361566de8c0c1c607b6e76254baf2d643998e4548ecf83676ae87c162819c3cbd11604def370ecfe9ea3b5884001688fe69cd6b88b8d153b67b32df9b8195813f2ba54973fca8292516a1ae940bcb8f8951b94bc39be17016b215199f51f4cad79f16b19521faee353d899e9e48a1941d755feb5eb4d955faff9cc2f2ea6903b67306f4677b1bd97b15e2b684156f992ec79ee957ce496c80b634e243edfdc775455a1263551410db97ce7a2bfd0eadb7e061e446272cd0b4f61fbd3d2a251f82a67fd2fccce157c22e5eb6364db9a7905bc06933f65cc61342182ca83a31fe56b022e9d4dbb1f5c998a1e4ac9715ae40a17858fb109fd67531062b96d5d72e6a567bd2445a37950f792e5e024d3aea4a8aa664c7fd932db4c14815ac34cc7bba21a22fa37a676ab7ffff5bbabd78bd0d7c8666b76e41a53567aead616856b3c4492a6a9d7d17f81e49b98e0a94cadcd629fbfd6e5b2d41e4c26b9befd6d31acd45ca408408e682a58149c9d02bd362efb42bd2dd60cc1fe346f7986f0726205b4115ffcd2dd669345188", 0x453}], 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=r4, @ANYBLOB="ac14400000000000000000002800070000000000008d000007000000070f7c000000000000520649d2cec7b099b257bbb0d6fae6debd50098df99037d21ffba273f56c72540000880ab501c873920d8d59a5c3824b72d487d8a1cfae642cc3a5943ed70b8a5d0bcf98f9969c94ff559f9e8cc7febbeffd894325cf964dd0188ffa7ba57983acd6322a5433"], 0x48}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@loopback, @local, @dev={0xfe, 0x80, '\x00', 0x41}, 0x2, 0x1, 0x9, 0x400, 0x4, 0xc0400009, r4}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) recvfrom$unix(r0, &(0x7f0000000200)=""/126, 0x7e, 0x101, &(0x7f0000000180)=@file={0x0, './file1\x00'}, 0x6e) statx(r0, &(0x7f0000000680)='./file1\x00', 0x400, 0x8, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000005c0)='./file1\x00', &(0x7f0000000600), 0x4, &(0x7f00000008c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@loose}, {@fscache}], [{@euid_gt}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@permit_directio}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, '^'}}, {@euid_lt={'euid<', r5}}]}}) execveat(r0, &(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=[&(0x7f0000000380)='(\x00'], &(0x7f0000000580)=[&(0x7f0000000500)='\x00', &(0x7f0000000540)='\xd2^\x00'], 0x1000) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x111801, 0x0) pidfd_getfd(r0, r6, 0x0) [ 2118.191707] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:19:36 executing program 0: r0 = syz_io_uring_complete(0x0) execveat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0) 03:19:36 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 03:19:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xffffe000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:19:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xf000000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:19:37 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 58) 03:19:37 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:19:37 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) syz_io_uring_setup(0x25, &(0x7f0000000080), &(0x7f0000fe9000/0x4000)=nil, &(0x7f0000fea000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)="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", 0xfd, r0}, 0x68) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x1) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x5}, 0x4) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = fork() ptrace(0x10, r2) ptrace(0x11, r2) syz_open_procfs(r2, &(0x7f0000000300)='attr/keycreate\x00') [ 2118.236733] FAULT_INJECTION: forcing a failure. [ 2118.236733] name failslab, interval 1, probability 0, space 0, times 0 [ 2118.239203] CPU: 0 PID: 15906 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2118.240625] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2118.242956] Call Trace: [ 2118.243509] dump_stack+0x107/0x163 [ 2118.244272] should_fail.cold+0x5/0xa [ 2118.245074] ? create_object.isra.0+0x3a/0xa20 [ 2118.246036] should_failslab+0x5/0x10 [ 2118.246821] kmem_cache_alloc+0x5b/0x350 [ 2118.247661] ? mark_held_locks+0x9e/0xe0 [ 2118.248517] create_object.isra.0+0x3a/0xa20 [ 2118.249469] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2118.250551] kmem_cache_alloc_trace+0x151/0x360 [ 2118.251542] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2118.252575] __list_lru_init+0x403/0x7e0 [ 2118.253453] alloc_super+0x7f4/0x990 [ 2118.254245] sget+0x10b/0x500 [ 2118.254920] ? kill_litter_super+0xa0/0xa0 [ 2118.255825] ? devpts_remount+0x130/0x130 [ 2118.256711] mount_nodev+0x2e/0x120 [ 2118.257478] ? devpts_kill_sb+0x70/0x70 [ 2118.258329] legacy_get_tree+0x105/0x220 [ 2118.259200] ? ns_capable+0xd9/0x100 [ 2118.259979] vfs_get_tree+0x8e/0x2f0 [ 2118.260768] path_mount+0x13ba/0x20a0 [ 2118.261605] ? strncpy_from_user+0x9e/0x460 [ 2118.262526] ? finish_automount+0xa40/0xa40 [ 2118.263427] ? getname_flags.part.0+0x1dd/0x4f0 [ 2118.264457] __x64_sys_mount+0x27e/0x300 [ 2118.265360] ? path_mount+0x20a0/0x20a0 [ 2118.266200] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2118.267300] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2118.268411] do_syscall_64+0x33/0x40 [ 2118.269203] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2118.270288] RIP: 0033:0x7f9c93414b19 [ 2118.271099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2118.274980] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2118.276571] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2118.278086] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2118.279592] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2118.281130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2118.282623] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:19:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x4c010000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:19:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xfffff000, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2118.356559] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:19:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x8f000000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:19:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xffffff7f, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:19:37 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 59) 03:19:37 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() ptrace(0x10, r2) ptrace(0x11, r2) syz_open_procfs(r2, &(0x7f00000001c0)='net/rt6_stats\x00') r3 = getpgrp(r0) ptrace$cont(0x7, r3, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg$unix(r1, &(0x7f00000014c0)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000280)=""/70, 0x46}, {&(0x7f0000000300)=""/212, 0xd4}, {&(0x7f0000000400)=""/77, 0x4d}, {&(0x7f0000000480)=""/99, 0x63}, {&(0x7f0000000500)=""/116, 0x74}, {&(0x7f0000000580)=""/233, 0xe9}], 0x6, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000000740), 0x6e, &(0x7f0000000a80)=[{&(0x7f00000007c0)=""/195, 0xc3}, {&(0x7f00000008c0)=""/201, 0xc9}, {&(0x7f00000009c0)=""/96, 0x60}, {&(0x7f0000000a40)}], 0x4, &(0x7f0000000ac0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x88}}, {{&(0x7f0000000b80)=@abs, 0x6e, &(0x7f0000000c00)}}, {{&(0x7f0000000c40)=@abs, 0x6e, &(0x7f0000000f00)=[{&(0x7f0000000cc0)=""/97, 0x61}, {&(0x7f0000000d40)=""/237, 0xed}, {&(0x7f0000000e40)=""/158, 0x9e}], 0x3, &(0x7f0000000f40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}}, {{&(0x7f0000001040)=@abs, 0x6e, &(0x7f00000013c0)=[{&(0x7f00000010c0)=""/83, 0x53}, {&(0x7f0000001140)=""/7, 0x7}, {&(0x7f0000001180)=""/90, 0x5a}, {&(0x7f0000001200)=""/148, 0x94}, {&(0x7f00000012c0)=""/253, 0xfd}], 0x5, &(0x7f0000001f40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="7d54d916a5cbf89631966caa156e8a89b7f77735083fa9c3f9c1ca87017f6f0a39a4dfb59e5b6da12e4c04266d8c164a7a8760115d8141a59a955ca42fdb692a3834dbb52dcbc5a0b7c59923823a2da540829ac1f83838b81687f4bfefa1fe3ece5f5dea72afb34eb9b8e180bae67245e3f39359874d4a3194f3191227177539a17557f0cc"], 0x78}}], 0x5, 0x60, &(0x7f0000001600)={0x0, 0x3938700}) r6 = fork() ptrace(0x10, r6) ptrace$setregset(0x4205, r6, 0x2, &(0x7f0000000040)={0x0}) r7 = gettid() recvmmsg$unix(r1, &(0x7f0000001d80)=[{{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001640)=""/131, 0x83}, {&(0x7f0000001700)=""/80, 0x50}, {&(0x7f0000001780)=""/84, 0x54}, {&(0x7f0000001800)=""/228, 0xe4}], 0x4, &(0x7f0000001940)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0x68}}, {{&(0x7f00000019c0), 0x6e, &(0x7f0000001d00)=[{&(0x7f0000002040)=""/149, 0x95}, {&(0x7f0000001b00)=""/244, 0xf4}, {&(0x7f0000001c00)=""/228, 0xe4}], 0x3, &(0x7f0000001d40)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x102, &(0x7f0000001e00)={0x0, 0x3938700}) r9 = syz_open_dev$vcsn(&(0x7f0000001e80), 0x2, 0x581000) r10 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r10, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r10, 0xc0189375, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r4}, './file1\x00'}) clone3(&(0x7f0000001ec0)={0x42000, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x2}, &(0x7f0000000180)=""/62, 0x3e, &(0x7f00000001c0)=""/147, &(0x7f0000001e40)=[r2, r3, r5, r6, r7, r0, r0, r8], 0x8, {r9}}, 0x58) 03:19:37 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) read(r0, &(0x7f0000000180)=""/238, 0xee) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:19:37 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0xffffffffffffffb7, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) clone3(&(0x7f0000000180)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2118.486182] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2118.549967] FAULT_INJECTION: forcing a failure. [ 2118.549967] name failslab, interval 1, probability 0, space 0, times 0 [ 2118.552525] CPU: 1 PID: 16224 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2118.553966] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2118.556272] Call Trace: [ 2118.556814] dump_stack+0x107/0x163 [ 2118.557591] should_fail.cold+0x5/0xa [ 2118.558386] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2118.559443] should_failslab+0x5/0x10 [ 2118.560229] kmem_cache_alloc_trace+0x55/0x360 [ 2118.561190] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2118.562228] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2118.563236] __list_lru_init+0x403/0x7e0 [ 2118.564076] alloc_super+0x7f4/0x990 [ 2118.564853] sget+0x10b/0x500 [ 2118.565509] ? kill_litter_super+0xa0/0xa0 [ 2118.566374] ? devpts_remount+0x130/0x130 [ 2118.567226] mount_nodev+0x2e/0x120 [ 2118.567965] ? devpts_kill_sb+0x70/0x70 [ 2118.568773] legacy_get_tree+0x105/0x220 [ 2118.569632] ? ns_capable+0xd9/0x100 [ 2118.570393] vfs_get_tree+0x8e/0x2f0 [ 2118.571158] path_mount+0x13ba/0x20a0 [ 2118.571943] ? strncpy_from_user+0x9e/0x460 [ 2118.572823] ? finish_automount+0xa40/0xa40 [ 2118.573723] ? getname_flags.part.0+0x1dd/0x4f0 [ 2118.574706] __x64_sys_mount+0x27e/0x300 [ 2118.575540] ? path_mount+0x20a0/0x20a0 [ 2118.576366] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2118.577456] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2118.578509] do_syscall_64+0x33/0x40 [ 2118.579273] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2118.580314] RIP: 0033:0x7f9c93414b19 [ 2118.581091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2118.584879] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2118.586441] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2118.587908] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2118.589383] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2118.590839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2118.592314] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2130.896059] kmemleak: 21 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:19:56 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0x20000c02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:19:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xffffff9e, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:19:57 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "9b43e97f581ca0629208b04c6665553eae9f89b464805e9f3cc179b15fbafdc47ccf1d0585576239bc3dca228e200e31a62e858eb5d28033b0906a8697e83830", 0x35}, 0x48, r2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = add_key(&(0x7f0000000480)='trusted\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000580)="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", 0x1000, 0xfffffffffffffffb) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', r4) 03:19:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0x9effffff}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:19:57 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 03:19:57 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 60) 03:19:57 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = fork() ptrace(0x10, r1) ptrace$setregset(0x4205, r1, 0x2, &(0x7f0000000040)={0x0}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/bus/pci', 0x400000, 0x10) clone3(&(0x7f0000000380)={0x80000, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x1a}, &(0x7f0000000180)=""/146, 0x92, &(0x7f0000000240)=""/136, &(0x7f0000000300)=[r0, r1, r0, r0], 0x4, {r2}}, 0x58) 03:19:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xda31de9c7572fde0, 0x128) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="08002bbd700058da00006ffab753210600000000000000000800040001000000c6d830cdc69b35a824eac05ef25f7e6dc5b9bd01e8"], 0x1c}}, 0x1) request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x4e21, @multicast1}}, 0x0, 0x0, 0x30, 0x0, "15917a9ab5d23691b1aec5734151b2891946418ac17b8b566ece8a0ee20ac3b703e5babb04e894c1cef20ed90daebf7bd15a98d210527fccd72248c5c9035601a88f8117ec05aad54e79726e4865f70a"}, 0xd8) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x3e32}}, './file0\x00'}) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x2) r3 = socket$unix(0x1, 0x2, 0x0) fallocate(r3, 0x76, 0x6, 0xfffffffffffff80a) [ 2138.197239] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2138.227083] FAULT_INJECTION: forcing a failure. [ 2138.227083] name failslab, interval 1, probability 0, space 0, times 0 [ 2138.229470] CPU: 0 PID: 16555 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2138.230892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2138.233194] Call Trace: [ 2138.233766] dump_stack+0x107/0x163 [ 2138.234520] should_fail.cold+0x5/0xa [ 2138.235307] ? create_object.isra.0+0x3a/0xa20 [ 2138.236243] should_failslab+0x5/0x10 [ 2138.237032] kmem_cache_alloc+0x5b/0x350 [ 2138.237900] create_object.isra.0+0x3a/0xa20 [ 2138.238807] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2138.239877] kmem_cache_alloc_trace+0x151/0x360 [ 2138.240858] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2138.241894] __list_lru_init+0x403/0x7e0 [ 2138.242758] alloc_super+0x7f4/0x990 [ 2138.243550] sget+0x10b/0x500 [ 2138.244206] ? kill_litter_super+0xa0/0xa0 [ 2138.245076] ? devpts_remount+0x130/0x130 [ 2138.245956] mount_nodev+0x2e/0x120 [ 2138.246716] ? devpts_kill_sb+0x70/0x70 [ 2138.247542] legacy_get_tree+0x105/0x220 [ 2138.248386] ? ns_capable+0xd9/0x100 [ 2138.249149] vfs_get_tree+0x8e/0x2f0 [ 2138.249933] path_mount+0x13ba/0x20a0 [ 2138.250719] ? strncpy_from_user+0x9e/0x460 [ 2138.251620] ? finish_automount+0xa40/0xa40 [ 2138.252506] ? getname_flags.part.0+0x1dd/0x4f0 [ 2138.253507] __x64_sys_mount+0x27e/0x300 [ 2138.254340] ? path_mount+0x20a0/0x20a0 [ 2138.255178] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2138.256242] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2138.257333] do_syscall_64+0x33/0x40 [ 2138.258097] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2138.259152] RIP: 0033:0x7f9c93414b19 [ 2138.259925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2138.263700] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2138.265284] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2138.266758] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2138.268239] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2138.269725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2138.271189] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:19:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xf0ffffff}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:19:57 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000cdc5355f945b5b8b42b0bcc387f18924672fe6554656c2c2a6b4c98279ecfb9f9ede49ce17370213ca932aab04b2833edbc2587684282b122850336ef8354d6f114d0912596e41f8f9229eb067f95e4f298529ca27ed0037310e17e907cf19af3f26", @ANYRES16=r1, @ANYBLOB="01000000000104000000070000000600210061000000"], 0x1c}}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:19:57 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "9b43e97f581ca0629208b04c6665553eae9f89b464805e9f3cc179b15fbafdc47ccf1d0585576239bc3dca228e200e31a62e858eb5d28033b0906a8697e83830", 0x35}, 0x48, r2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = add_key(&(0x7f0000000480)='trusted\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000580)="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", 0x1000, 0xfffffffffffffffb) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', r4) 03:19:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xfffffff0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:19:57 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(r1, &(0x7f0000000040)='./file1\x00', 0xa41, 0x1d0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0xa001, 0x0) r3 = clone3(&(0x7f0000000500)={0x7048380, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) clone3(&(0x7f0000000440)={0x180000, &(0x7f0000000180)=0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200), {0x27}, &(0x7f0000000240)=""/133, 0x85, &(0x7f0000000300)=""/252, &(0x7f0000000400)=[r3], 0x1, {r0}}, 0x58) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000004c0)) 03:19:57 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r1 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = request_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000180)='syz', r0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x3f, 0x7f, 0x8, 0x4, 0x0, 0x1ff, 0x2890, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000240), 0x2}, 0x8000, 0x2, 0x1f, 0x1, 0x3f, 0x1, 0x9, 0x0, 0x9, 0x0, 0x4}, r1, 0x7, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f00000001c0)='syz', &(0x7f0000000200)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:19:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xfffff000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2138.468169] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:19:57 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 03:19:57 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) clone3(&(0x7f00000012c0)={0x1001000, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x10}, &(0x7f0000000180)=""/201, 0xc9, &(0x7f0000000280)=""/4096, &(0x7f0000001280)=[r0], 0x1}, 0x58) 03:19:57 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "9b43e97f581ca0629208b04c6665553eae9f89b464805e9f3cc179b15fbafdc47ccf1d0585576239bc3dca228e200e31a62e858eb5d28033b0906a8697e83830", 0x35}, 0x48, r2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = add_key(&(0x7f0000000480)='trusted\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000580)="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", 0x1000, 0xfffffffffffffffb) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', r4) [ 2152.425718] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:20:19 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 03:20:19 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x101800, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) getdents64(r1, &(0x7f0000000540)=""/1, 0x1) execveat(r0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000240)=[&(0x7f0000000140)=']\x00', &(0x7f0000000180)='\'!.!(:\x89)$^\xde-(a,&*\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='&\x00'], &(0x7f00000004c0)=[&(0x7f0000000280)='\x00', &(0x7f00000002c0)='.}+\\/.#-\\\x00', &(0x7f0000000300)='-:(#[)\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)=']#-#:[][@\x00', &(0x7f0000000400)='%.{\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='\x00'], 0x1000) 03:20:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x3, 0xfe, 0x1f, 0x0, 0x3, 0x83004, 0x1f, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xd}, 0x201, 0x3f, 0x8, 0x1, 0x10001, 0x2, 0x80, 0x0, 0x3ff, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x3) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x5, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:20:19 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "9b43e97f581ca0629208b04c6665553eae9f89b464805e9f3cc179b15fbafdc47ccf1d0585576239bc3dca228e200e31a62e858eb5d28033b0906a8697e83830", 0x35}, 0x48, r2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:20:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xffffff7f}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:20:19 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 61) [ 2160.911107] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:20:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xfffffffc, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:20:19 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000180)="046fec1a919448001ae9b7888977e6484265bf59140f5b82c525eadddc037b818516be502f9bd35b8b528f577d816f4a3efa75caf55393f2a2c8a9d35e31149cd008586df8ff32b07f3c3d1909890a3aa0ed8a4694245c0416d9b3", 0x5b, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) io_setup(0x7, &(0x7f0000000200)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000240)={0x7}, 0x7) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r3, &(0x7f0000000240)={0x7}, 0x7) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000640)=ANY=[@ANYBLOB="52f8e6531daa2c3bbb8f985b0a1800fbca", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) io_submit(r1, 0x4, &(0x7f0000000780)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x8000, r5, &(0x7f0000000380)="2dfcacb5e7bf84e0baa930ea3dfae975ccbb4ede7f8f44dcbaf6d332a5224aade72af65e815a769c8c20092d75b2025f5caa58f6bc26cedbee11e9c9dc96adc35f237e23a317f057e655d265b1b7241ab4a95d804e79f923f6ee9a9f0a175a7b7d422f9ddc088f7191eed0d07185caa3539c6c6d0fd3ef75bc4e28d68c82c5f5527c26b886fce25afa62943c92cf434d212f62f379905629ab81fce40310678f46ccad7e256c2443a943c6759e7489303f3ee2b1055e776e13573716226e0ea4799520601dcef03970d241f89656c219d19a097d888bb39535cc6186f248e4e830", 0xe1, 0x3, 0x0, 0x3, r2}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x6, r0, &(0x7f0000000480)="c336250a3ee7d1e623b03597cd069dbc701c0c83102ea921db63b2f0f52e0fd5cff33de6a522c762dfd7e4b22c9b882a5f6122d34e7dd48b6f643a17929455c2899bb520e327139aecae6b37c98331be6ac604b475921c7d7a260631e61cdb7d1f0148857c7aedd1b2bc1d147ec221b7c4446cff509537e57d66f999c7dd80e8eae445", 0x83, 0x20, 0x0, 0x1, r3}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x5, 0xffc, r4, &(0x7f0000000540)="d2349c4ffeb060edfb99fa3838a4ad5bde22c54d6280e8c72d2b33d4084536fa3de1c8fa8243fe295ee6b5dd1e21df38799737acec754a35526a181b87457709184184a04c47663f57d5070339eee50f6f3e0bcfc98df4dd4d6c4f6f32d6d134aeaab021f834bb15603d462cce0cd1f422345d112c6af9e9e391d52ff3ca9cd14bb11b8417e766e9060112aad4361a5272695e9e48cf", 0x96, 0xfff0000000000000, 0x0, 0x3}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000800)="1f11066ca0000add2afe1273669c1d4c8d03c6dd297e40fa6586f8969ffe163c19c06520becc3e4cce403332516176f564564e605c29c91573b2225f6be45ba08121fe78df046e5cc5c76561b2528ebce135e96f9bbaa41539aa91a04b08ba1c07c002023d2e4707c1199aab00ee1192fe6bd30139480e218e3847c0928d6a3515bac574179d6cba6ebbc8510b80226b29c00c7f55726b01df6de8837c3ca5b4f5c7fbaaae3940f82e4b6828bd4afebe5a82f5ea1097552bb4bb35dafd493211d94f5171eff5bb2bd6b32da1a68a781f0cd53d80e3b5aab94cbc5f78095bcf682ce95fa88d5c65c2435f3ecebec9fa7dbda2fa2dc487ca7ed75dccac635c2693e3196fb7fa4d86edbc8fff106fa59e36929cc3dc61e562df88f83733f3d34ebe81a86541c7ccb7eb07111a1e513b5d1b52397d7cc851e0575c25124a9caf06feeee14b968de52533bcca4c4c24af7fd82d8c9a271d0d3dbd48fff7ee959dfcd18d343d011ba3a0cef532f8522d19e087bebca991e805e4b17848d978cfef67009098d1434b26d1da56946b6e619df229", 0x190, 0x1}]) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2160.935853] FAULT_INJECTION: forcing a failure. [ 2160.935853] name failslab, interval 1, probability 0, space 0, times 0 [ 2160.938307] CPU: 1 PID: 17314 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2160.939725] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2160.942048] Call Trace: [ 2160.942594] dump_stack+0x107/0x163 [ 2160.943349] should_fail.cold+0x5/0xa [ 2160.944142] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2160.945192] should_failslab+0x5/0x10 [ 2160.946009] kmem_cache_alloc_trace+0x55/0x360 [ 2160.946962] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2160.948029] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2160.949059] __list_lru_init+0x403/0x7e0 [ 2160.949924] alloc_super+0x7f4/0x990 [ 2160.950676] sget+0x10b/0x500 [ 2160.951320] ? kill_litter_super+0xa0/0xa0 [ 2160.952162] ? devpts_remount+0x130/0x130 [ 2160.953011] mount_nodev+0x2e/0x120 [ 2160.953760] ? devpts_kill_sb+0x70/0x70 [ 2160.954566] legacy_get_tree+0x105/0x220 [ 2160.955383] ? ns_capable+0xd9/0x100 [ 2160.956145] vfs_get_tree+0x8e/0x2f0 [ 2160.956897] path_mount+0x13ba/0x20a0 [ 2160.957694] ? strncpy_from_user+0x9e/0x460 [ 2160.958575] ? finish_automount+0xa40/0xa40 [ 2160.959449] ? getname_flags.part.0+0x1dd/0x4f0 [ 2160.960422] __x64_sys_mount+0x27e/0x300 [ 2160.961231] ? path_mount+0x20a0/0x20a0 [ 2160.962077] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2160.963157] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2160.964235] do_syscall_64+0x33/0x40 [ 2160.965011] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2160.966076] RIP: 0033:0x7f9c93414b19 [ 2160.966868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2160.970725] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2160.972310] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2160.973803] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2160.975289] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2160.976767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2160.978270] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:20:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0xffffffff, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:20:19 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "9b43e97f581ca0629208b04c6665553eae9f89b464805e9f3cc179b15fbafdc47ccf1d0585576239bc3dca228e200e31a62e858eb5d28033b0906a8697e83830", 0x35}, 0x48, r2) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:20:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xffffff9e}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2161.046895] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2175.505185] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:20:43 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 03:20:43 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "9b43e97f581ca0629208b04c6665553eae9f89b464805e9f3cc179b15fbafdc47ccf1d0585576239bc3dca228e200e31a62e858eb5d28033b0906a8697e83830", 0x35}, 0x48, r2) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:20:43 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x1b}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) r2 = fork() r3 = fork() ptrace(0x10, r3) ptrace$setregset(0x4205, r3, 0x2, &(0x7f0000000040)={0x0}) r4 = fork() ptrace(0x10, r4) ptrace(0x11, r4) syz_open_procfs(r4, &(0x7f00000001c0)='net/rt6_stats\x00') recvmmsg$unix(r1, &(0x7f0000004280)=[{{&(0x7f00000002c0), 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/73, 0x49}], 0x1, &(0x7f0000000400)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xd0}}, {{&(0x7f0000000500)=@abs, 0x6e, &(0x7f0000001700)=[{&(0x7f0000000580)=""/168, 0xa8}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/14, 0xe}], 0x4, &(0x7f0000001740)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f00000017c0), 0x6e, &(0x7f0000002d00)=[{&(0x7f0000001840)=""/199, 0xc7}, {&(0x7f0000001940)}, {&(0x7f0000001980)=""/244, 0xf4}, {&(0x7f0000001a80)=""/239, 0xef}, {&(0x7f0000001b80)=""/222, 0xde}, {&(0x7f0000001c80)=""/46, 0x2e}, {&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/61, 0x3d}], 0x8, &(0x7f0000002d80)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa8}}, {{0x0, 0x0, &(0x7f0000004180)=[{&(0x7f0000002e40)=""/101, 0x65}, {&(0x7f0000002ec0)=""/230, 0xe6}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000003fc0)=""/41, 0x29}, {&(0x7f0000004000)=""/19, 0x13}, {&(0x7f0000004040)=""/148, 0x94}, {&(0x7f0000004100)=""/68, 0x44}], 0x7, &(0x7f0000004200)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}], 0x4, 0x60, &(0x7f0000004380)) r6 = fork() ptrace(0x10, r6) ptrace$setregset(0x4205, r6, 0x2, &(0x7f0000000040)={0x0}) r7 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r7, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) clone3(&(0x7f0000004400)={0x38000c000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x12}, &(0x7f0000000240)=""/5, 0x5, &(0x7f0000000280), &(0x7f00000043c0)=[0x0, r0, 0x0, r2, r3, r4, r5, r6], 0x8, {r7}}, 0x58) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000040)='\x00', &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff) 03:20:43 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7}, 0x7) openat(r0, &(0x7f0000000040)='./file1\x00', 0x115080, 0x210) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f00000001c0)={0x1, 0x0, 0x4}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r1, r3, &(0x7f0000000180)=0x6, 0x3) 03:20:43 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r2) r3 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "198be94fbb35c897dcf37f04ebd4f9f4ecd9bf010e61f00f837f8e57242cba52965f202765246dad807ffa6de0379fed4c517d5e92f64077beb89fbb4c6a4ca9", 0x3f}, 0x48, r2) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r3) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:20:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xfffffff0}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:20:43 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 62) 03:20:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0xf, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2184.347308] FAULT_INJECTION: forcing a failure. [ 2184.347308] name failslab, interval 1, probability 0, space 0, times 0 [ 2184.349811] CPU: 0 PID: 17757 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2184.351266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2184.353611] Call Trace: [ 2184.354188] dump_stack+0x107/0x163 [ 2184.354956] should_fail.cold+0x5/0xa [ 2184.355754] ? create_object.isra.0+0x3a/0xa20 [ 2184.356705] should_failslab+0x5/0x10 [ 2184.357497] kmem_cache_alloc+0x5b/0x350 [ 2184.358348] ? mark_held_locks+0x9e/0xe0 [ 2184.359200] create_object.isra.0+0x3a/0xa20 [ 2184.360113] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2184.361171] kmem_cache_alloc_trace+0x151/0x360 [ 2184.362169] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2184.363199] __list_lru_init+0x403/0x7e0 [ 2184.364058] alloc_super+0x7f4/0x990 [ 2184.364845] sget+0x10b/0x500 [ 2184.365496] ? kill_litter_super+0xa0/0xa0 [ 2184.366383] ? devpts_remount+0x130/0x130 [ 2184.367249] mount_nodev+0x2e/0x120 [ 2184.368004] ? devpts_kill_sb+0x70/0x70 [ 2184.368825] legacy_get_tree+0x105/0x220 [ 2184.369672] ? ns_capable+0xd9/0x100 [ 2184.370456] vfs_get_tree+0x8e/0x2f0 [ 2184.371233] path_mount+0x13ba/0x20a0 [ 2184.372036] ? strncpy_from_user+0x9e/0x460 [ 2184.372933] ? finish_automount+0xa40/0xa40 [ 2184.373833] ? getname_flags.part.0+0x1dd/0x4f0 [ 2184.374858] __x64_sys_mount+0x27e/0x300 [ 2184.375707] ? path_mount+0x20a0/0x20a0 [ 2184.376542] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2184.377630] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2184.378717] do_syscall_64+0x33/0x40 [ 2184.379488] entry_SYSCALL_64_after_hwframe+0x44/0xa9 03:20:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in=@rand_addr=0xffffffff}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2184.380548] RIP: 0033:0x7f9c93414b19 [ 2184.381462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2184.385269] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2184.386865] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2184.388334] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2184.389809] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2184.391296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2184.392782] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:20:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x13, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:20:43 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "9b43e97f581ca0629208b04c6665553eae9f89b464805e9f3cc179b15fbafdc47ccf1d0585576239bc3dca228e200e31a62e858eb5d28033b0906a8697e83830", 0x35}, 0x48, r2) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:20:43 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x21) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000180)={{0xffffffff, 0x6}, 0x100, './file1\x00'}) 03:20:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x10f, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:20:43 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) request_key(&(0x7f0000000380)='id_legacy\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='}^{),\x00', r0) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x43040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180)='rxrpc_s\x00', r2) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00e1\x00'/16]) r4 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000540)='5', 0x1, 0xfffffffffffffffc) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r6}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000015c0)={{0x1, 0x1, 0x18, r3, {0x7a5}}, './file1\x00'}) keyctl$KEYCTL_MOVE(0x1e, r4, 0xfffffffffffffffc, r5, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000440)={r4, 0x1000, 0x8a}, &(0x7f0000000480)={'enc=', 'raw', ' hash=', {'blake2s-224-x86\x00'}}, &(0x7f0000000500)="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", &(0x7f0000001500)=""/138) readv(r3, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/15, 0xf}], 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000001600)={0x7, 0x7fff, 0x6, 0x4f1, 0xc3}) [ 2184.619368] netlink: 251 bytes leftover after parsing attributes in process `syz-executor.2'. 03:20:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:20:43 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 63) 03:20:43 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 03:20:43 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "9b43e97f581ca0629208b04c6665553eae9f89b464805e9f3cc179b15fbafdc47ccf1d0585576239bc3dca228e200e31a62e858eb5d28033b0906a8697e83830", 0x35}, 0x48, r2) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:20:43 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = gettid() r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/zoneinfo\x00', 0x0, 0x0) clone3(&(0x7f0000000380)={0x40800100, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x3f}, &(0x7f0000000180)=""/251, 0xfb, &(0x7f0000000280)=""/84, &(0x7f0000000300)=[r0, r0, r1, r0], 0x4, {r2}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:20:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x110, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2184.705758] FAULT_INJECTION: forcing a failure. [ 2184.705758] name failslab, interval 1, probability 0, space 0, times 0 [ 2184.707286] CPU: 0 PID: 18268 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2184.708119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2184.709450] Call Trace: [ 2184.709774] dump_stack+0x107/0x163 [ 2184.710242] should_fail.cold+0x5/0xa [ 2184.710705] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2184.711307] should_failslab+0x5/0x10 [ 2184.711760] kmem_cache_alloc_trace+0x55/0x360 [ 2184.712302] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2184.712908] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2184.713513] __list_lru_init+0x403/0x7e0 [ 2184.714024] alloc_super+0x7f4/0x990 [ 2184.714478] sget+0x10b/0x500 [ 2184.714866] ? kill_litter_super+0xa0/0xa0 [ 2184.715381] ? devpts_remount+0x130/0x130 [ 2184.715887] mount_nodev+0x2e/0x120 [ 2184.716328] ? devpts_kill_sb+0x70/0x70 [ 2184.716834] legacy_get_tree+0x105/0x220 [ 2184.717342] ? ns_capable+0xd9/0x100 [ 2184.717817] vfs_get_tree+0x8e/0x2f0 [ 2184.718313] path_mount+0x13ba/0x20a0 [ 2184.718807] ? strncpy_from_user+0x9e/0x460 [ 2184.719351] ? finish_automount+0xa40/0xa40 [ 2184.719894] ? getname_flags.part.0+0x1dd/0x4f0 [ 2184.720480] __x64_sys_mount+0x27e/0x300 [ 2184.720993] ? path_mount+0x20a0/0x20a0 [ 2184.721507] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2184.722165] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2184.722812] do_syscall_64+0x33/0x40 [ 2184.723280] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2184.723931] RIP: 0033:0x7f9c93414b19 [ 2184.724396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2184.726695] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2184.727645] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2184.728537] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2184.729426] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2184.730324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2184.731223] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2184.800161] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2196.632923] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:21:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:21:03 executing program 0: clone3(&(0x7f0000000080)={0x112048380, 0x0, 0x0, 0x0, {0x3d}, 0x0, 0x0, 0x0, 0x0}, 0x55) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x1000) 03:21:03 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:21:03 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) recvfrom(r0, &(0x7f00000001c0)=""/157, 0x9d, 0x12100, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x2, @multicast2}}, 0x80) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) flistxattr(0xffffffffffffffff, &(0x7f0000000100), 0x0) request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xffffffff}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x20) 03:21:03 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 03:21:03 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 64) [ 2204.506650] FAULT_INJECTION: forcing a failure. [ 2204.506650] name failslab, interval 1, probability 0, space 0, times 0 [ 2204.508470] CPU: 1 PID: 18618 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2204.509504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2204.511216] Call Trace: 03:21:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x111, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:21:03 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ee) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x400, 0x5c) r2 = socket$packet(0x11, 0x2, 0x300) sendfile(r2, r0, &(0x7f0000000040)=0x7, 0x1) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000002c0)=ANY=[@ANYBLOB="02db8dbc5400d2fadb35be7e0c7cf137369124431201af32a84ec4a2ccab856d9ad5ea870ce504ff035353547acdfe98994c8bc89ccb0a5eb5a0f4b176aa75fa7ad6bf92d93c6c1924dee88660d2db11deb56095bf2fe6ffffff7fa3cd0fbfd631d70463e41f3e0dfe6259a9f3570895dd8991e1fb5ff7cc", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32]) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r4, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r5, &(0x7f0000000240)={0x7}, 0x7) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r7, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote}, 0x1c) sendfile(r7, r6, 0x0, 0x9bbb) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000280)={0x7, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, r2, r3, r4, r1, r5, r6]}, 0x7) 03:21:03 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:21:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x8}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2204.511633] dump_stack+0x107/0x163 [ 2204.512389] should_fail.cold+0x5/0xa [ 2204.512983] ? create_object.isra.0+0x3a/0xa20 [ 2204.513664] should_failslab+0x5/0x10 [ 2204.514236] kmem_cache_alloc+0x5b/0x350 [ 2204.514854] ? mark_held_locks+0x9e/0xe0 [ 2204.515463] create_object.isra.0+0x3a/0xa20 [ 2204.516126] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2204.516896] kmem_cache_alloc_trace+0x151/0x360 [ 2204.517580] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2204.518313] __list_lru_init+0x403/0x7e0 [ 2204.518931] alloc_super+0x7f4/0x990 [ 2204.519480] sget+0x10b/0x500 [ 2204.519950] ? kill_litter_super+0xa0/0xa0 [ 2204.520573] ? devpts_remount+0x130/0x130 [ 2204.521193] mount_nodev+0x2e/0x120 [ 2204.521751] ? devpts_kill_sb+0x70/0x70 [ 2204.522385] legacy_get_tree+0x105/0x220 [ 2204.522988] ? ns_capable+0xd9/0x100 [ 2204.523540] vfs_get_tree+0x8e/0x2f0 [ 2204.524096] path_mount+0x13ba/0x20a0 [ 2204.524664] ? strncpy_from_user+0x9e/0x460 [ 2204.525306] ? finish_automount+0xa40/0xa40 [ 2204.525949] ? getname_flags.part.0+0x1dd/0x4f0 [ 2204.526664] __x64_sys_mount+0x27e/0x300 [ 2204.527276] ? path_mount+0x20a0/0x20a0 [ 2204.527879] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2204.528652] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2204.529424] do_syscall_64+0x33/0x40 [ 2204.529974] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2204.530745] RIP: 0033:0x7f9c93414b19 [ 2204.531303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2204.534004] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2204.535132] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2204.536193] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2204.537242] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2204.538327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2204.539393] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2204.541233] netlink: 253 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2204.569704] cgroup: fork rejected by pids controller in /syz1 03:21:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x112, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:21:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0xf}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2204.624690] netlink: 254 bytes leftover after parsing attributes in process `syz-executor.2'. 03:21:03 executing program 0: clone3(&(0x7f0000000100)={0x110096000, 0x0, 0x0, 0x0, {0x2d}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:21:03 executing program 7: arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xe1b1) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) sendmsg$inet6(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="df08b5007d2841e1dd326bd5027bd74cf9db35ba4e39add61041b6055bd1b6aa28dd1b3d5a5928b42ff9aafb8c5e8b53441ae03eef5adbe1c34530dd31d77811c05ed226b9575dabcffbd343dba8c7b6b31c5b3606693dbe8a1b2ac9750ebc30ea72b0d5dcbb969237fa0a7dcec620922552fbeac14164b38d25d01de66847d3e115603d5bcbe097", 0x88}, {&(0x7f0000000040)="611ba65ec1c58efbd46c246a778752a006b7c4d2c7a76cdda5d0abf49ece639186fc3a33b708cd428eae8b50e26157765d5aac3acf41a18d55ac0f97d283", 0x3e}, {&(0x7f0000000240)="009682d465818738e9168a1167be6d1cf8ee4e7a06868c512c3f1a44a105c72ce756dcfd1abb44a5b8268e78bcf41f320c9a38dd2695833be358f75053491fb952c200b6257a2239cc986fb5ab83a252134e21ce48d534926cc9561f384117ccde9b74a709031a24e4a7bcd4f08f21e69918f3f091485a6920513d", 0x7b}, {&(0x7f00000002c0)="72d0b2d727ed2628c650e65b51b3cf1ab8aff85fec43545b1aa63860b5892598039c6054c02b7861f69b7fddfdd20d3a9389e62d", 0x34}], 0x4}, 0x40001) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:21:03 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff00000000) 03:21:03 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x40800) fallocate(r0, 0x2, 0x10000, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:21:03 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:21:03 executing program 0: clone3(&(0x7f00000000c0)={0x3040780, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2217.387291] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:21:23 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0xb}, 0x6}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:21:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x113, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:21:23 executing program 0: clone3(&(0x7f0000000080)={0x3060600, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0xffffffff, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="3aee3b3030303030303030303030303030303036334d"]) 03:21:23 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 65) 03:21:23 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:21:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x8f}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:21:23 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3044b80, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040), 0x8, 0x14000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) 03:21:23 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xff0f000000000000) [ 2224.930402] FAULT_INJECTION: forcing a failure. [ 2224.930402] name failslab, interval 1, probability 0, space 0, times 0 [ 2224.932785] CPU: 0 PID: 19264 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2224.934212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2224.936555] Call Trace: [ 2224.937114] dump_stack+0x107/0x163 [ 2224.937874] should_fail.cold+0x5/0xa [ 2224.938688] ? create_object.isra.0+0x3a/0xa20 [ 2224.939644] should_failslab+0x5/0x10 [ 2224.940437] kmem_cache_alloc+0x5b/0x350 [ 2224.941284] ? mark_held_locks+0x9e/0xe0 [ 2224.942136] create_object.isra.0+0x3a/0xa20 [ 2224.943057] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2224.944124] kmem_cache_alloc_trace+0x151/0x360 [ 2224.945103] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2224.946128] __list_lru_init+0x403/0x7e0 [ 2224.947005] alloc_super+0x7f4/0x990 [ 2224.947795] sget+0x10b/0x500 [ 2224.948450] ? kill_litter_super+0xa0/0xa0 [ 2224.949324] ? devpts_remount+0x130/0x130 [ 2224.950190] mount_nodev+0x2e/0x120 [ 2224.950956] ? devpts_kill_sb+0x70/0x70 [ 2224.951779] legacy_get_tree+0x105/0x220 [ 2224.952619] ? ns_capable+0xd9/0x100 [ 2224.953395] vfs_get_tree+0x8e/0x2f0 [ 2224.954175] path_mount+0x13ba/0x20a0 [ 2224.954995] ? strncpy_from_user+0x9e/0x460 [ 2224.955269] netlink: 255 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2224.955891] ? finish_automount+0xa40/0xa40 [ 2224.955916] ? getname_flags.part.0+0x1dd/0x4f0 [ 2224.955967] __x64_sys_mount+0x27e/0x300 [ 2224.960370] ? path_mount+0x20a0/0x20a0 [ 2224.961201] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2224.962288] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2224.963385] do_syscall_64+0x33/0x40 [ 2224.964161] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2224.965223] RIP: 0033:0x7f9c93414b19 [ 2224.966000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2224.969806] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2224.971399] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2224.972878] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2224.974355] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2224.975859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2224.977340] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:21:23 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:21:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0xf0}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:21:23 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 66) 03:21:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x114, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:21:23 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "198be94fbb35c897dcf37f04ebd4f9f4ecd9bf010e61f00f837f8e57242cba52965f202765246dad807ffa6de0379fed4c517d5e92f64077beb89fbb4c6a4ca9", 0x3f}, 0x48, r2) keyctl$unlink(0x9, r0, r2) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:21:24 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00d15059479e7b3e65f1ff66696c65317c00"]) lremovexattr(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000140)=@random={'os2.', '*\x00'}) execveat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0) 03:21:24 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x7a7a800c) close(r0) [ 2225.194399] FAULT_INJECTION: forcing a failure. [ 2225.194399] name failslab, interval 1, probability 0, space 0, times 0 [ 2225.197036] CPU: 1 PID: 19688 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2225.198752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2225.201053] Call Trace: [ 2225.201708] dump_stack+0x107/0x163 [ 2225.202474] should_fail.cold+0x5/0xa [ 2225.203382] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2225.204430] should_failslab+0x5/0x10 [ 2225.205202] kmem_cache_alloc_trace+0x55/0x360 [ 2225.206135] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2225.207173] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2225.208180] __list_lru_init+0x403/0x7e0 [ 2225.209011] alloc_super+0x7f4/0x990 [ 2225.209780] sget+0x10b/0x500 [ 2225.210417] ? kill_litter_super+0xa0/0xa0 [ 2225.211286] ? devpts_remount+0x130/0x130 [ 2225.212147] mount_nodev+0x2e/0x120 [ 2225.212894] ? devpts_kill_sb+0x70/0x70 [ 2225.213706] legacy_get_tree+0x105/0x220 [ 2225.214553] ? ns_capable+0xd9/0x100 [ 2225.215320] vfs_get_tree+0x8e/0x2f0 [ 2225.216089] path_mount+0x13ba/0x20a0 [ 2225.216876] ? strncpy_from_user+0x9e/0x460 [ 2225.217762] ? finish_automount+0xa40/0xa40 [ 2225.218662] ? getname_flags.part.0+0x1dd/0x4f0 [ 2225.219633] __x64_sys_mount+0x27e/0x300 [ 2225.220470] ? path_mount+0x20a0/0x20a0 [ 2225.221302] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2225.222375] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2225.223436] do_syscall_64+0x33/0x40 [ 2225.224200] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2225.225243] RIP: 0033:0x7f9c93414b19 [ 2225.226003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2225.229761] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2225.231326] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2225.232782] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2225.234241] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2225.235707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2225.237163] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:21:24 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) [ 2225.242834] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2240.058957] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:21:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x14c}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:21:47 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x20000002}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:21:47 executing program 3: request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400) 03:21:47 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = clone3(&(0x7f00000002c0)={0x1000, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140), {0x29}, &(0x7f0000000180)=""/139, 0x8b, &(0x7f0000000240)=""/54, &(0x7f0000000280)=[0xffffffffffffffff], 0x1}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ftruncate(r2, 0x100000000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r4, r3, 0x0, 0x9bbb) pidfd_getfd(r2, r4, 0x0) r5 = fork() ptrace(0x10, r5) ptrace(0x11, r5) syz_open_procfs$namespace(r0, &(0x7f0000000640)='ns/pid_for_children\x00') syz_open_procfs(r5, &(0x7f00000001c0)='net/rt6_stats\x00') clone3(&(0x7f00000005c0)={0x8000, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0), {0x13}, &(0x7f0000000400)=""/186, 0xba, &(0x7f00000004c0)=""/144, &(0x7f0000000580)=[r0, r1, r5], 0x3}, 0x58) 03:21:47 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f00000000) 03:21:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x115, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:21:47 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 67) [ 2248.772514] FAULT_INJECTION: forcing a failure. [ 2248.772514] name failslab, interval 1, probability 0, space 0, times 0 [ 2248.774944] CPU: 1 PID: 20019 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2248.776037] netlink: 257 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2248.776342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2248.776349] Call Trace: [ 2248.776380] dump_stack+0x107/0x163 [ 2248.781659] should_fail.cold+0x5/0xa [ 2248.782448] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2248.783492] should_failslab+0x5/0x10 [ 2248.784278] kmem_cache_alloc_trace+0x55/0x360 [ 2248.785223] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2248.786264] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2248.787283] __list_lru_init+0x403/0x7e0 [ 2248.788095] alloc_super+0x7f4/0x990 [ 2248.788867] sget+0x10b/0x500 [ 2248.789509] ? kill_litter_super+0xa0/0xa0 [ 2248.790389] ? devpts_remount+0x130/0x130 [ 2248.791251] mount_nodev+0x2e/0x120 [ 2248.791985] ? devpts_kill_sb+0x70/0x70 [ 2248.792800] legacy_get_tree+0x105/0x220 [ 2248.793649] ? ns_capable+0xd9/0x100 [ 2248.794416] vfs_get_tree+0x8e/0x2f0 [ 2248.795199] path_mount+0x13ba/0x20a0 [ 2248.795978] ? strncpy_from_user+0x9e/0x460 03:21:47 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) [ 2248.796870] ? finish_automount+0xa40/0xa40 [ 2248.798032] ? getname_flags.part.0+0x1dd/0x4f0 [ 2248.799030] __x64_sys_mount+0x27e/0x300 [ 2248.799876] ? path_mount+0x20a0/0x20a0 [ 2248.800713] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2248.801801] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2248.802889] do_syscall_64+0x33/0x40 [ 2248.803675] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2248.804725] RIP: 0033:0x7f9c93414b19 [ 2248.805512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2248.809400] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2248.811032] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2248.812546] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2248.814057] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2248.815608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2248.817123] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:21:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0xf00}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:21:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x116, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:21:47 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) [ 2248.975801] netlink: 258 bytes leftover after parsing attributes in process `syz-executor.2'. 03:21:47 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x2, {{0x10, 0x4, 0x6}, 0xc02}}, 0xfffffffffffffea2) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:21:47 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x6}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2262.001721] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:22:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x4c01}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:22:07 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xb56}}, 0x18) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file1/file0/file0\x00', 0x181dc6, 0x20) write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7}, 0x7) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f0000000280)={{r0}, "9b4d453fda4b187447b662fd8994d4e839e61dc661586e623a3582014266054d3dad6da8135c7d794aba7683c453968133f3c92686a14e58d7c108b6ec52bac3ceeb89fe35bea4b9bc2bc7102b5b779498cc29721b5db9462015c04315ce4e04c01b0fc3f0cd01701efe72ccb9188bcf08c826aec046931aee8910b5cff9e253e63b7e405f37244d8aa8a3ce86a95d1e34c17d7b19f32949731703f1d7572ae5809d4b9f1dd1f619beb2dc565743fee2972e6ab0bd2c236a1d20cf4ee898111f21265394a0b8180180bd1a9ff95f6c959b24201c880ced58ff7de5672b2fbd3165858b07354b3e6c2f30521824a778447f42449755787194980cf2e7cb02397845ee54bb623b4d95b5146752508c92eb266230332ab1102415d5911eff965e2f90497a3e7d788e391071d30a7ed34fa53077557a9f9e823d6b2d7fd9077f0bf7adee311c717d6d32ead066314111effaa28ae63d464f9607d832418842173e894dc97b24a77d87d5f50d4c14f0d44c7563418ed1fc5e6b93d8ba5b9e061eb85164973ac70054b71539a0b4608160d465ec589982e056b9195809b1bf10ba1c77ffdcf8cd766aa1d0f775d993231707ca54e706c2039bf99114639a6b1464e5c19b21fd48b1e4bb1105ff75db2950cd79c403e5f6fd0261d988b53399a7772e19b451f2937024286b5ce5f114c5ef0c70e773239f349421e1c05b45fbb737ac97aaf967d3b964f69afb26e22e543ee6e979702021c180e51c4e1a73c2a21d33737aba7dc30da333b4bfb5e866d28e4e445b61e1fa7e632adc06f99abee8b5120bcf95f9168af73303fb421ed9d44ce085f448b99c55ab360b918266ffeb86a18b47e8cac1885ec4debd3b2fcb1c1600786f6a8fdc7d15e0c10b780f8e7bf5228923d1eaa22e7ad7b64e4e3d1ff19d9feb452ebdc1694fac8ed74157a1b33c23a2517556ce40840f76442019dd1b884fb444294f142a2fb1c2e5b8b8ee61711cc8e663aaf78f040c1890862f5483a033ed8ac2cfbe8f44feaa9b15b545d40ca4b4b44243442e214feb822b83b943049563db32cc0b869a6d9b8260d7c86bf0d48c0d331340712aaee0949cb29d3eb51944c514aa2400dccf14bbca75cac6655d0710cd05c1dada8165da68ba6c220fb3ce989bd706d0fbfb3332a41d13958fc0b4c9e7681746bccf5a0c5911be6661f9914d142c4e8efb8ccb0fee2aeadc0ec4257449031cd7a340eb20f8d4b78b7e72c8ed771cf5739983d9b34f5a2e627b4690c1e9a90d550b4ff032de828e62ca9b5200784b8a41b0b743e3cd27449ffc954cda764a2f3ed681975f3d7398b2a336c62d37b29c1ed68be8a886a85bf55a129c7ec04ef691b105a7d031cca8c2aee7800a7535a755fb97e4d2ec2535723bf19884c48acf12475a384b507636a5a972900c4ec5239be73aa8f534eb93745f7c9540d3ff4276286a65115bf3fae073bb297414f516dc6abcc3432f08c7012476b465c35d5b09bceed41330a69f1b94de210af5c302c43bb4091b0d0261e4502968208b2e482bf866581923b9e302a200a728ec869dac689e90b55254c8f613f8a38bb4e7e6b3849687f2f21c7e28c2f83d96946bc59cbdbf8e0694bb77d5bff1ec826b3b2998a74d428f9cb52cbdb1bfa2f2a3e4287080e755eacc9d6b4374d66ae7fa8fd68175b3b38601a7fc917f82899594139fdb75e2131ac63c5e1f542e7eaef7f93bfbe2b54924d852c572f5d281070e9ccb0b71731020dfc0489ee5370a51f41863212db1e632100c16d2122736c64285f31fbfd6317aa3f12a73c94bc306631d05a7ab5e7fc90e12061cc314c0be8fe72a7228ea501dc949556cfd3ca28c1f0c851ae8834d4972838b67351201773481eda0076689eac8757aabc04893644d3af124132736359ec7456679b4049aec97b5e39994e8b8f0eb25d3d72e0eda3b2df7c75b48322d67ef937e0f57beb835d9e8c38298515167bde3e486c9080a9c56459f1d239af7c000dd87888e8a875a710b2494da7fe7acb04bbc7d6589895bba2be53fdaf4affc8b04cc3c05237f14481ed20d41c3a1b1eb830b55a5f6d298b0eb421c60020bef7dc8dc911d1bf6caec6dd47ebc69987e07b440b986936bb01bf2d75a62a6efa36e2212393738839d7e5914d97194b35a55ab13675f02ad1172c3c9a157356fed3ba4cda98f78fbb9003bdc32930606716a07602e6092800c8579db77d0ba81ea720c03547d4617c2c66180b2cc55396ea8f6c759cd97c501049434fb3fb2d960ff1b241d5155e22971d5d95fbc1c6a20323ba5e20ef4d8992f0ddd4dfea543abebcc988f00a223d0510962841e8c61352ef1b8f5c4bd821690e2a4b156ac82f707d877c3a8d4fece9f1a8153273ea8fa21e42eb0f0ae15b6a29c048aecf3a3a08fb3edbc258e7610f8669383d0904603c58118c5e090d866fafba3689433b6be30134503923c8b3d5e4ca802ab6796c7675288ce7ea08631f4851422c04b054eabc465005b793750d98b73bfb04c738d0eb197e9a41f32127300cfc78cf8955b56e62b95f1f496c0b14e38acb471fbab4b5bf9fb283d70f4f4fb1d917bb8df5837ddfd33b067a01dd891eb4f88f09a423211f13b5ecf3a2f25e88f3198ff6645857b08ee9094d94af524540a2db955cb8a72e46fe157b9ff2f188037df852b7c274effb9a3cc83bfc3a136c79d1c6f8d0158c9d5318dc22f556cf2e5d167ffe5c09626caf63bf2040331ea0b3b4074f772b298c0570c2238bfc32ea98a5cdc6f40885ee2b58a9bac6b85359973a4e48ec5638b1ccb00c9a307c0c2dbb6fdf835974391708498c6b24fbe7d3cbae69b73a1149a0f0b9dd9e183fd6acb9ca22797a4efda175805faf83d1919eea2a7f8b6996742cb8ae5d5f17bbecb4eb35f48fe91dbed9c0c23337b31450d108b2ea981de613bd18cc38d46abf46a99afc061787428ec16171e085c62c97ad9fa1436e60d789684c71b18bb10afeb4ef578940965454a2974e26cb98939c200c54c59bbf198e267f13ea64c0ebfc5ab3f9ca7916f581c73e8dc11b93a0b4b143ee5f79684887c5f4b23d909399f1906821f06e29a04ac471b494f8891d51fbe3b0ad6a7db88f0f461bb3df698372c29bd15a1741296d0e9153936930e9822eac6f57d0eabe56a6cd68d24caba48d3343eb750cf5b5ef28cbfeed01bac6a44e068183226264f38562d06af5795f36fd4e83cdda24c18d742e40a6b78fc05519109459c497cd39fcac56dbc9d9541a305e2454788698724685900f5cd580e429bdefa630d80a9a0ce2de58a2e76d4aea24341ecd9952464ce0e1701eb9354f715014687c8cafdf66bb69e50fde276eb3a250062e2ab7278f2fefe6bf147836f9c9a6805a2bafc2eef48a6f5e0b958014ff85ba8afa21c2ed45c87ff579a466b791d3b48f2ec685345b158d105b5589cc7cc1d3e2e7482bb2cc6ec41b19a25efa2f71d6239f38c400b17557875712007b8bea1505b22e37780893b05321aed425ae312e02be7f606b141ce3866ac8fd0026ff171a55dab9f0e395a4ce86cf0107150ae44512825332419811e25889f50164867fdf3bd4d1a2e911f0ab2887fffab145d345055e5d92e4f06422b3c2aaedceee6b5ddd1dbb55555611a2723cadb17aac6d40decf4a4f06823a3fd8e1aeaf898d62ffa5112192467f398d9ecf3106988dfb58dee2f34706ce7f985e9fd1f94b728dd2bb7a5144f70b1968d16fb658de11eb6fc4aee3e02d7d3f0e7af12d122fbe367967da8993b137c212625c7688d7da2dd8711deeeba98e9ceaa4c04e01a397eb3bd1bd97f6b63bab533cf2f3197db03034ba60a078248dfa851608673e51a8b26c87f3eb5b4ed840f02af3421cd05175d41f4054b68bf308714f1e09881f68aa34f83046aee8e52887271f7a30ee76688f62dd90aeb311263868886f792915690df56d46d4e6d690aaffba85d8b211e0ed97bad427be9cf16a3eab5a9bcc0b5d147e625cfee67869a51c45f1574d16cf460c23c478ce27a2cd470f7ff19cefa962f6bdf8063de383f5067d3fb5211cbfd564a8968472a164a2dcd5cc8f9a6658101a6c671187ad85ff58a3b8f29d954725aff5770d9bc2d4f2ccfb90047d329a71f846e569702cda149f5f1aeb01d5ef1e8401e76c7219dab98fbd469accf6a7c72ab75adfcd299d561ff4319e160c0467eba11443609b3b797a9ba6a57983ee6aebe1ffd0580b4d0efd5cf230e4e1f2ee1c5ad2dfe5be364c85ab1831a29adc7ff5e22d9a7efbe88225a5d59b5bd3f7d90b8d7491b465f583eca0ebf702b2595fc78e806d1d773c3feab7728efb0f390836b96df85a4e6df7cd002601c2d717a30bcf22eccb7ef0230902c0f8ccfa0e1b93eecd710bda0ec46e0946184664311510b614a81e72f6298c580684fc8134cbf559f039ae5fd5ec8efb7e943b90fbebaa464b7fa6635c8d3adcc07dc56dab6d7e680f4c01ebd039c2038177d0f8e314435b5acc53bd75472f6aad1ab0ea7369314285fbebba6ca2f64e0ea47874c5942fb5a42debbb977978c0b3df18b84f86aa2dfe619e3cb1fbe5e1ed7d10a3eecfe24ce60b5e8a041cd920f484b764f3b309cfc21d5d8719b8002a7f21ff1b6b6ac895ee9407a7d098a90c23e00bc0634d8dd4cdc7190bd69d4273b78933471fc98693842add5fc92276efca69b742f713b077f6b4fb080c524851f5c437bd7bc0fc2214bcd09b4e88fb0f1cf66338ab26e36075aedfc3f03f41129ae061673f065bda9db656346125d3e84a348ebef393f2b164c7c944ab5ea1fbd13f9a559f2a293c2ee7104efad59704d430a61c8e83968e6e0a1c97cd8b2895689c79228229cfdb56f5c46b90ec8fb35ade9ea03eff4817d418e3f67abc469f6c49fa5a5d7a273948c3df7faf632025f32fc1284a3a4cb63a16df406e645f45404e3570d869f3013f861f243c1a9faee47b1267d99ec5694a81de237cc108793561b751d6ebf9ff39324a27aba9172b158107ee39ef7cb00260ade2515045ff96e0d6b3879e04e8a48af0b661f6818401dd9547befb6aaae6e4c608d933ce1d8543ed95ade2f5a0485ec03806f9af4a82daa62aab881bdef1fa6b06e7d4240330bf813fa8a11900faf4aab84615e516adf6b469403a93c07c522c5bb85dd6bfef4cf6e80ebb12732e724f05849616148adc4ed35dd5e3973479357e36b7d5cd069707bdbf9a52c96b39891ccad68df99e2586873e16189d4c62cfd3200ee5c5cba142cfc55fb56cbff28bda2007145d2458db2f2642c41772f713b55c2e6e9eba2ec0bd13f4708835e08a2bdd99311fb305bbe0de46c1f25d4171ef6dfe1e2116b563f58c2cfa1025ae3f437a9c3bb583e65c2abb183e7feb24fcb6da91e715df8df5cd7269a510ddee1c456bda1109ceafa9263a31bc034a42c7a2a247d86ef122717417913850a6357eca25a264b2a24ca8d158b7b2b7cda5e5d9f017242e7c71f60185741e0a6309923baf90d057e34c8ff48d3685d6d803f0814588899c9fe13dc432c6de17fb49a1e58e2f3da129969fedfbcf331938198a4b57ccf80be8b289ba9459f7f8540514740721c6f2b379cfb2e492fad8783afd794c0be928d9ff9cc58d89f0a653a297310903e7200a5a503653b8111a3489373738c1f2f58ccebe6a595f8ef2fe83360e8ae32332cf604b4f40ba72ee92428847b7063e99bc3c283e1aae1228e821bd02cbeda1690fb565a2e4c434de2919a4aa0fc13b980f7e40a994d2418733ca949c29fac7da3590b6400"}) clone3(&(0x7f0000000080)={0x23040800, 0x0, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file0\x00', 0x0, 0x0, 0x800) 03:22:07 executing program 0: clone3(&(0x7f0000000080)={0x3043300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x117, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:22:07 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 03:22:07 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 68) 03:22:07 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:22:07 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) openat(r1, &(0x7f0000000040)='./file1\x00', 0x30000, 0x4) r2 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ptrace(0x11, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/rt6_stats\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x9bbb) clone3(&(0x7f0000001440)={0x8000080, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), {0x3f}, &(0x7f0000000380)=""/137, 0x89, &(0x7f0000000440)=""/4096, &(0x7f00000002c0)=[0x0, 0x0, r3, r2, r2, r2], 0x6, {r4}}, 0x58) [ 2269.039517] netlink: 259 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2269.057297] FAULT_INJECTION: forcing a failure. [ 2269.057297] name failslab, interval 1, probability 0, space 0, times 0 [ 2269.059694] CPU: 1 PID: 20678 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2269.061108] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2269.063407] Call Trace: [ 2269.063946] dump_stack+0x107/0x163 [ 2269.064692] should_fail.cold+0x5/0xa [ 2269.065465] ? create_object.isra.0+0x3a/0xa20 [ 2269.066394] should_failslab+0x5/0x10 [ 2269.067186] kmem_cache_alloc+0x5b/0x350 [ 2269.068014] ? mark_held_locks+0x9e/0xe0 [ 2269.068845] create_object.isra.0+0x3a/0xa20 [ 2269.069737] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2269.070779] kmem_cache_alloc_trace+0x151/0x360 [ 2269.071767] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2269.072770] __list_lru_init+0x403/0x7e0 [ 2269.073608] alloc_super+0x7f4/0x990 [ 2269.074376] sget+0x10b/0x500 [ 2269.075013] ? kill_litter_super+0xa0/0xa0 [ 2269.075881] ? devpts_remount+0x130/0x130 [ 2269.076725] mount_nodev+0x2e/0x120 [ 2269.077468] ? devpts_kill_sb+0x70/0x70 [ 2269.078277] legacy_get_tree+0x105/0x220 [ 2269.079103] ? ns_capable+0xd9/0x100 [ 2269.079891] vfs_get_tree+0x8e/0x2f0 [ 2269.080652] path_mount+0x13ba/0x20a0 [ 2269.081425] ? strncpy_from_user+0x9e/0x460 [ 2269.082317] ? finish_automount+0xa40/0xa40 [ 2269.083200] ? getname_flags.part.0+0x1dd/0x4f0 [ 2269.084176] __x64_sys_mount+0x27e/0x300 [ 2269.084998] ? path_mount+0x20a0/0x20a0 [ 2269.085808] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2269.086874] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2269.087931] do_syscall_64+0x33/0x40 [ 2269.088684] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2269.089726] RIP: 0033:0x7f9c93414b19 03:22:07 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, 0x0) [ 2269.090481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2269.094419] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2269.095977] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2269.097426] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2269.098877] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2269.100341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2269.101788] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:22:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x8f00}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:22:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x118, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:22:08 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) [ 2269.253047] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.2'. 03:22:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97, 0x0, @perf_config_ext={0x200}, 0x0, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/43, 0x2b}], 0x1, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c0000000000000001000000020000007f9d49ce033c39505b85d21edf041ba491f0c5913ec719e7d68253908525aa1d1ff1f6267dda4cf5eaf09d96a3f0e4340d90cc3c96b7d11db76c0ab6523ad3ec82c59012c6b84379530004f1f4208958f05078b17e4f20f53d9d2058632d84916afc6c70fb676105ec53802e3981ba1abcb2d8a5d0bb3234fcdcb38268225adf15dcc864d712c7d3d58f05829c1e91f350c9829260aedcf754b58262bd2672c771a0bc90f1431be9f6e2a7ebed90aa8abd27426eedd99e898a3dcf7b5b19a2e709a1396f29f55ec7a6a4a3f864787cf7fad03475643908", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ab072a7e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xe8}, 0x40010040) kexec_load(0x4, 0x3, &(0x7f0000000840)=[{&(0x7f0000000680)="0b039d9d71e0ad9a373de281b6f431e44ffcccf42b36654233b6e8bb7f4dd01b1b37d0a42752af29a30f4c0b4e3c4a1241e6fe0daad66fc68f9b47e577fe0ca88998208f65dda34884755cfb1e8fc13fadad26703e4fec8521f903cfb48d4f1eb731d724e091", 0x66, 0x3, 0xfffffffffffffffa}, {&(0x7f0000000700)="f80708459980bc28200e6cea8235a1d01c79541d299a612f1fe876657ddacff5f16e1f02a494e95697d197b6caa50360dcdeba9408e07fe17ea7", 0x3a, 0x0, 0x19ed}, {&(0x7f0000000740)="14dc241a8792583fccca062a950ba8bf384fabbad28831844324936aed9c47bf9cda448cc18ddc2784d529ba3de3955a6aa558c7ebc80ed6d1cef3e3e248f635916cee688c54adf205b86466628253ac880a8089e9d5373a3a98a02adc47bfc191584ab5f076dc9cc6c0840f044d98f1122e8fde0f8d1bdc76a78c8d313b4657e07fc2c86a419ab2e9f34f6b67b5bf847a4660ad3fdcb68e24445ae84b766e9a847f99ff24294871e9f320f9cea8af7c1e9fe04b2a34482c2d7f0fdeaacdb1639c5bbe794c35ee31dc12a293be983064c958", 0xd2, 0x6}], 0x0) r2 = signalfd4(r0, &(0x7f00000005c0)={[0xf0000]}, 0x8, 0x800) clone3(&(0x7f0000000600)={0x42000, &(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0), {0x2b}, &(0x7f0000000200)=""/46, 0x2e, &(0x7f0000000240)=""/196, &(0x7f0000000580)=[r1], 0x1, {r2}}, 0x58) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:08 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 03:22:08 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 69) 03:22:08 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(0xffffffffffffffff, &(0x7f0000000040)='+\\/-\x00', 0x2) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0xf000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:22:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x119, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2269.392867] FAULT_INJECTION: forcing a failure. [ 2269.392867] name failslab, interval 1, probability 0, space 0, times 0 [ 2269.395330] CPU: 0 PID: 20999 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2269.396747] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2269.399051] Call Trace: [ 2269.399608] dump_stack+0x107/0x163 [ 2269.400367] should_fail.cold+0x5/0xa [ 2269.401153] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2269.402205] should_failslab+0x5/0x10 [ 2269.402993] kmem_cache_alloc_trace+0x55/0x360 [ 2269.403975] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2269.405034] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2269.406073] __list_lru_init+0x403/0x7e0 [ 2269.406732] netlink: 261 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2269.406929] alloc_super+0x7f4/0x990 [ 2269.409479] sget+0x10b/0x500 [ 2269.410141] ? kill_litter_super+0xa0/0xa0 [ 2269.411012] ? devpts_remount+0x130/0x130 [ 2269.411910] mount_nodev+0x2e/0x120 [ 2269.412684] ? devpts_kill_sb+0x70/0x70 [ 2269.413506] legacy_get_tree+0x105/0x220 [ 2269.414340] ? ns_capable+0xd9/0x100 [ 2269.415155] vfs_get_tree+0x8e/0x2f0 [ 2269.415927] path_mount+0x13ba/0x20a0 [ 2269.416736] ? strncpy_from_user+0x9e/0x460 [ 2269.417637] ? finish_automount+0xa40/0xa40 [ 2269.418554] ? getname_flags.part.0+0x1dd/0x4f0 [ 2269.419556] __x64_sys_mount+0x27e/0x300 [ 2269.420402] ? path_mount+0x20a0/0x20a0 [ 2269.421239] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2269.422244] do_syscall_64+0x33/0x40 [ 2269.423018] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2269.424087] RIP: 0033:0x7f9c93414b19 [ 2269.424864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2269.428629] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2269.430210] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2269.431687] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2269.433140] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2269.434591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2269.436063] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2280.644377] kmemleak: 52 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:22:26 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x2, {{0x2, 0x6, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:26 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, 0x0, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:22:26 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 70) 03:22:26 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = syz_io_uring_setup(0x22, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0, 0x12001}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r4) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat(r4, &(0x7f0000000040)='./file1\x00', 0x84980, 0x10) 03:22:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0xffff}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:22:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x11a, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:22:26 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0xfcf6, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) fallocate(r0, 0x4, 0x7fffffff, 0x5) clone3(&(0x7f0000000080)={0x30c0300, 0x0, 0x0, 0x0, {0x26}, 0x0, 0x4f, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:26 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) keyctl$search(0xa, 0x0, &(0x7f0000009180)='.dead\x00', 0x0, 0xfffffffffffffff8) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000002c0)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040), 0x5, 0x111000) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r3, 0xf507, 0x0) [ 2287.759068] netlink: 262 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2287.792743] FAULT_INJECTION: forcing a failure. [ 2287.792743] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.794937] CPU: 0 PID: 21314 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2287.796297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2287.798457] Call Trace: [ 2287.798971] dump_stack+0x107/0x163 [ 2287.799693] should_fail.cold+0x5/0xa [ 2287.800450] ? create_object.isra.0+0x3a/0xa20 [ 2287.801335] should_failslab+0x5/0x10 [ 2287.802065] kmem_cache_alloc+0x5b/0x350 [ 2287.802845] ? mark_held_locks+0x9e/0xe0 [ 2287.803643] create_object.isra.0+0x3a/0xa20 [ 2287.804490] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2287.805468] kmem_cache_alloc_trace+0x151/0x360 [ 2287.806371] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2287.807319] __list_lru_init+0x403/0x7e0 [ 2287.808126] alloc_super+0x7f4/0x990 [ 2287.808867] sget+0x10b/0x500 [ 2287.809477] ? kill_litter_super+0xa0/0xa0 [ 2287.810284] ? devpts_remount+0x130/0x130 [ 2287.811073] mount_nodev+0x2e/0x120 [ 2287.811795] ? devpts_kill_sb+0x70/0x70 [ 2287.812570] legacy_get_tree+0x105/0x220 [ 2287.813356] ? ns_capable+0xd9/0x100 [ 2287.814065] vfs_get_tree+0x8e/0x2f0 [ 2287.814790] path_mount+0x13ba/0x20a0 [ 2287.815561] ? strncpy_from_user+0x9e/0x460 [ 2287.816413] ? finish_automount+0xa40/0xa40 [ 2287.817255] ? getname_flags.part.0+0x1dd/0x4f0 [ 2287.818174] __x64_sys_mount+0x27e/0x300 [ 2287.818971] ? path_mount+0x20a0/0x20a0 [ 2287.819765] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2287.820787] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2287.821793] do_syscall_64+0x33/0x40 [ 2287.822516] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2287.823521] RIP: 0033:0x7f9c93414b19 [ 2287.824248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2287.827798] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2287.829278] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2287.830643] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2287.832020] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2287.833415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2287.834782] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:22:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x11b, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:22:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:22:26 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, 0x0, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) [ 2287.927395] netlink: 263 bytes leftover after parsing attributes in process `syz-executor.2'. 03:22:26 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fsetxattr(r0, &(0x7f0000000040)=@random={'btrfs.', 'syz'}, &(0x7f0000000140)='\\\x00', 0x2, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:26 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0xff59) r0 = fsmount(0xffffffffffffffff, 0x1, 0x0) execveat(r0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000040)=0xe6e) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x90000000}) setxattr$security_evm(&(0x7f00000001c0)='./file1/file0\x00', &(0x7f0000000200), &(0x7f0000000280)=@v1={0x2, "99c36f792536d43e36"}, 0xa, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) ioctl$int_out(r1, 0x2, &(0x7f0000000100)) openat(r0, &(0x7f0000000140)='./file1/file0\x00', 0x412602da07455102, 0x0) [ 2300.815733] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:22:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:22:47 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="238a81206ad142ca2f402213ea412203b258210f55957a3c8789f172f6351736b403810abc0dea7739b8e8d385e9756996f292f9ac590e4c593b7c2c93f06e231cd79404693e4d172a5b6db31c92989bd1703b3c51cd1c545cdedef25137d59211bced68db102e6d6d9199a6c2fc93985341195f58b3d06d4860059cc6bfbc239e5ad40f3dd82c58", 0x88, 0x4}, {&(0x7f0000000200)="1a22e908b3ecad805c4fe5aa864e0cb54871e5c783875ecab65e2875b206dc3a5f052d28fceead55fb3e86d767797c2d51f4fab1cddae39d3d3bd4cd3214c4b80ec26ac169707618888a90ce53d4608b2714f1e0d30114b257821ff92e28d4569aea4494b1cfca621d3d509e3869332f4eb182932d6ae8e79d9c0e187f404fd1ca55b08af711d018a492489f0b", 0x8d, 0x7fff}, {&(0x7f00000002c0)="6527f99ebb60755d693aa180917589ebc447335b63204fbc36490306c410f11fc44698bff1798fe0e9ab3c017707ddaa029902bb0130c946e14fd9d47abec3", 0x3f, 0x1000}, {&(0x7f0000000300)="a9c4be2335c1f934dec2b6061ba658d57f90b429123c24466b52444b156eaabf91f16cc81ab11093933c3a1b68b949a2e23b4d481bdb47c860a2f920157f53192305df390110f72f6e88812f73d8763150cdaa5a0e8bab6a4fe628c6fbce4e93c7971df66831c35a2f5fb55ee3ed860347f93dc29c86a5200783848f039b31a813111fce4bd67d678932f7403ae65c6f1031dab0c761b2a23bde6ceb888c83f15f5ca9060376", 0xa6, 0x54a8}, {&(0x7f00000003c0)="e9953acfd6c1cb4f06b3a2cffbe7384fa1a20d1ddef0718999147617434b853ba85c9e9ec76b79b84c29c885bb08bbfe5254188e0da7b6ccaf36f19ac8fc36aa71cec7829872afedcdc943de151a0b69e40132f68a14593cb0b5200defc819bde079c1a5407d061f55fc6eeeee2b414be926a7bb0ce87d55b7ab80c741019b2db40e435d1f1a4ee0ab6695881cd5dc3a7e0cbe83582c15e5b4ffd8fe07d18befb5179b2769ec075edbf513c81a9a73c5e921eb736ee3", 0xb6, 0x1000}], 0x10, &(0x7f0000000500)={[{@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}, {@mode={'mode', 0x3d, 0x1}}, {@uid={'uid', 0x3d, 0xee01}}, {@mpol={'mpol', 0x3d, {'local', '=relative', @void}}}], [{@euid_lt={'euid<', 0xee01}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '/\\'}}, {@uid_gt={'uid>', 0xee01}}, {@pcr={'pcr', 0x3d, 0x1b}}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) r3 = fork() ptrace(0x10, r3) ptrace(0x11, r3) syz_open_procfs(r3, &(0x7f00000001c0)='net/rt6_stats\x00') openat(0xffffffffffffffff, &(0x7f0000000600)='./file1\x00', 0x400000, 0x86) kcmp(r0, r3, 0x6, r2, 0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:47 executing program 6: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000480)={'fscrypt:', @desc3}, &(0x7f00000004c0)={0x0, "50d6830a0ec41d4ba6f0241c3ccc3471c6e12dbe5f1960846b038c2983beebd77770d2b22e1af92f468864e8d50e914d8478f4f790f1b907c12115c60488eaa6", 0x28}, 0x48, 0xfffffffffffffffe) request_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)='rxrpc_s\x00', r1) r2 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r3 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000540)='5', 0x1, 0xfffffffffffffffc) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r5}) r6 = add_key$fscrypt_v1(&(0x7f0000000640), &(0x7f0000000680)={'fscrypt:', @auto=[0x35, 0x35, 0x0, 0x64, 0x31, 0x37, 0x63, 0x61, 0x62, 0x65, 0x66, 0x33, 0x32, 0x37, 0x34, 0x62]}, &(0x7f00000006c0)={0x0, "ac7521116e2f9e630a8873a814e7bc8716d6e1a707c5dcae3dd4081b149131fc9bca2eaf725d74b9741b697e9291d4b384b9d1dda9ec30726a46d86d2122f2fc", 0x12}, 0x48, r0) request_key(&(0x7f0000000580)='rxrpc_s\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='fscrypt:', r6) request_key(&(0x7f00000001c0)='.dead\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000300)='+/\x00', r4) r7 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r7}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, 0x0, 0x0) keyctl$revoke(0x3, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, 0xfffffffffffffffc, r4, 0x0) keyctl$unlink(0x9, r3, r0) close(r2) clone3(&(0x7f0000000080)={0x23840300, 0x0, 0x0, 0x0, {0xfffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x11c, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:22:47 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="9d0074", @ANYRES32=r0, @ANYBLOB="ffff0000000000002e2f66696c653000"]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000001c0)={0x0, 0x100000001, 0xa58}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:47 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, 0x0, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:22:47 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 71) 03:22:47 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open_tree(r0, &(0x7f00000014c0)='./file1\x00', 0x800) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001580)={'syztnl2\x00', &(0x7f0000001500)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x35, 0xffffffff, 0x4c, @mcast2, @private0, 0x20, 0x8, 0x200, 0xd7}}) sendmmsg$sock(r2, &(0x7f0000002000)=[{{&(0x7f00000015c0)=@ll={0x11, 0xf7, r3, 0x1, 0x4, 0x6, @local}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001640)="3171d4e595b9b248428fb25aeb4ce4ee80fc3783ff0409d02500de0b98ce479422df4240e1e4a16c7c81cbb536b54f96991b91f2343e747f7c292044356fb674cea41777ce6516525c913132eb49285acb220f382c2792008e41aa0f538e6e85576c9bb4e66084aadb3af4baa1127cf39450a5a019a11fb96d75866e66e2dab9", 0x80}, {&(0x7f00000016c0)="570830e00a063e6c8a71f12eadffd617979242e6e067cd864d7637563ce274ea9c966b74a29b40df8fafd437d88c279db99477755b1b11d9e5ec09bddc2740e4b7117fe01ea583b75aa3b04d507a6d8c2a5864cb0debef42aa5e126a51dbd26879a97c02aa4afbf5", 0x68}, {&(0x7f0000001740)="3e043836c8a69e95e37dae34c8baf50705757eeb8e66c6d95b9ba59f2c2a28905d4fb6f742f7f68832bfe9f8440bbe30a0221a7821da25af16e27ef42536c31df9572588efa70a548cbc3d92557b12b33c69af484144e368e2ff2fd115a4d3178bf37181690bc78e", 0x68}, {&(0x7f00000017c0)="dd57b873fd4079622c84cac09617c1f262a07b8551bc94b390b34485ddb090f0ed720999ea8bff06475e93b899fbc59ed8f26c1f5ec5b59765aed101c21acbdf3dce64758a7945615a67bafd329e1524f6f8931258eede7703bdf19eae3abca9a144bb874f8c87b8425e357bc60ad286fc68b7474e6a43cf17c534b8d4f58c20ef81f69e63cd6bd2a1afe0eca768ab6cf015a1ea268eb07eef49550d8bc04ccbab4bbcfb5837314746dd1a77ee5eb3bef6353fd5cb2813f60a2ebd5522b71b4a7fb42cd3e8a53b5f452d72d8ac7e924cb66c07c19d1ec6994fea0284e9f8dfc80262f8a2c2fc3b825a29d206", 0xec}, {&(0x7f00000018c0)="8ced659ef40b4be7eb7ed905a8261e0b7ed4ada68d3897bd644567ffc479d6568e9f37420457ecc07599af83ceca663dc2d06e3949cce5de73f6d19429274a2c11bca2a9bfe980241b973a93d22d18", 0x4f}, {&(0x7f0000001940)="1d28dbd6d3945aaedd7c371814765c1170baae9ee54568719394e290332d57ce054c2181dd454b12b7a451235816f69e5ce6cd044321d85de378d79a7f77480d6bce992108ca5b376ece6598dffcca8d7af2e7cc10cc41e9394223d387d079f23e8cd841627025698cdfc1812e5b8daa3afb903331c358e5ff7292ed4a79c498db224993a74f54dbc13f3d36415c9f01d957dc213820a8eb7085d6a4ba69828f61cb1a2ceffa9802c8937e869343dabed94960e1c735724b01c768ea5c38", 0xbe}], 0x6}}, {{&(0x7f0000001a80)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001b00)="ababffd537ea874eb4a73c5e87f739bf4ed3aaf672a57906399774d433e5ace531e706315642230b67639edbe8b6e388be6737b45cfb52306d5cdc1efcb42c47490462f13f67c94415c4b9a50a4b170153b3c9e3b7ee174772ec3b532afa51258ff74a8a9ddd1691d5fe573d8101b3490369a7f6d05804496937f19c11d3601d503a798b2d5ed79f30090870907f64be3999f1ef7d61117227a9a43674c1e9abc6728651e4c61fd973e25a2a8dfc3dd7fdd266c24b1cbbea06b71b7a389dbfd1762d4f22", 0xc4}, {&(0x7f0000001c00)="766619107a1433c3624c21f877bba98d0bc258cc5d2d3f50265a98304bf1a8dc6de9e158d61f3ed35fee257bd5a298130e7c506678b6c69d1a2eb9947c25cd0e77d401373ac3951f0c4360d7d2bedd25e794e219150a06898676bbda6c94906b13552399f8be2bc475e893e0a9f3537ea6669036a5b972066f7524052cbfa8e33eae466184451ac0aa1cf7abf029d7242e8a7cc37e1fe1a2a6a08bf5ce3ba4ae8de121700a1d913713f6fd30945683bc8a87a6938164cc2dc506a61266df517d1fe0a3cac4c92a4b4fdc6e62556100f3314e0e854089a5", 0xd7}, {&(0x7f0000001d00)="aa539f8e62a779e3ba3d87c7a7ee407accbea8d3c20b6bec2b86ab4de61234755ab934c68f3e9348ea2ff215b71507dee2fce844797e32aed5e87512f32f8defc613df43cc75cef5fc9aef30b40fc9199924088c541801d675c019574d9a610a29210b09d35b6bf37bc2f866014062b209dcde10cd1d62539641757105f1be0e1db8b3f4f7fdcdd20467f0b9c56f0b15d786f498838a04161eb6177e526e9e34c2dd408bba89f1f167579e8f15aa8ac41c7eab264072b6b893e73f8806de6b551ccce2dab125d9d5c6db4b7558a1f1", 0xcf}, {&(0x7f0000001e00)="6774b4aae72455f6a4efc97669fbfd2f87d77a8e23ed25817b374755ec2c3d5a6f623281ea7cbcc2c678f67295543f5fa1bd2b4508f607b3908ba0a74974998e0b8da5a919661e0e688119cc7d37c5575b86e953e16a436808ad002f169e1c508a8dcad8a7ca398641c676d56541586d29471b18af3bb74579f576b26927e1b69141", 0x82}, {&(0x7f0000001ec0)="789a330eb01960d63b9fea08cfac2e8ce430a04e159524973370eb6d28c4bd62230ef6fa9525d2b68f022c4d92e744847c641055a834673ddf0695735d8102c0269e61942f09ebcaa44622789d75f174e66ef5d55652b15dc4af977fd89ec9054158e00e652c30d8445999a47934b846b8efcdaad5a71322cc2cef8bbf0098b9bbefdce551ffdf17ac54b717f8e0c8000bbe4eb4cfb43f5ffddba622db", 0x9d}], 0x5}}], 0x2, 0x80) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000000300)={0x5, &(0x7f0000001380)=[{0x8, 0x40, &(0x7f0000000040)="c7cbcdc6e6f69ed8aeeefb26bfba39ff553c8710e5f10956ed018afba7d142e8e76d57ea97d92e47a27e09493a3127d736ba911aada840bea6cc1cbba3c09234", 0x0, 0x1}, {0x8, 0x70, &(0x7f0000000100)="8d3ca1977d96d496f2efe0aa0ff3e6fe827505c5d63609b5a2ab2e6f358af34a908294758fb149eb0ebdb2e94ad41efa504ceec5e7f48327e36eddd8de37c97a1bdff47c9e08bd5a89ecf717c96b286555fa93fc8c2457541bbe1f6933b95a0ad8d04df4d232a571f1ef6ab838319129", 0x0, 0x1}, {0x921b, 0x1000, &(0x7f0000000380)="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", 0x1}, {0x2b64, 0xee, &(0x7f0000000180)="249162ed284850d81774662fbe881f7ee0c058f5be2e5f0d1267bd345babee25a30b5241999dec92a2060632632bcf50f2c3c6c207808eb1a490658e7b9b2334ea57f590b5dde950b472edacf045389b58e601320f527995d20659f49d71feb184a97971f80a22be8c7ce6410b983514f757ef76ae854cff73ea36c6d12210f2790da0b6b5586444543e2bf825a2a1b012d8aecf2458b8842a1091661065c972a81ad016d4af5d7c861a19af25b3f034a38ab055eb838fe11c3dfcb2c4f34fbfaee89a81c6864012f651076062ba876af02ef1d35fd075fd2d252d3946a9d0f7500b46113814de48788312b30eee", 0x1, 0x1}, {0x10000, 0x17, &(0x7f00000002c0)="b45b91a366a05b2e438f2b0cc5e1b7873a2049060118cf"}]}) [ 2308.468368] FAULT_INJECTION: forcing a failure. [ 2308.468368] name failslab, interval 1, probability 0, space 0, times 0 [ 2308.470882] CPU: 1 PID: 21856 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2308.472398] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2308.474842] Call Trace: [ 2308.475408] dump_stack+0x107/0x163 [ 2308.476228] should_fail.cold+0x5/0xa [ 2308.477053] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2308.478144] should_failslab+0x5/0x10 [ 2308.478956] kmem_cache_alloc_trace+0x55/0x360 [ 2308.479963] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2308.481072] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2308.482120] __list_lru_init+0x403/0x7e0 [ 2308.482998] alloc_super+0x7f4/0x990 [ 2308.483823] sget+0x10b/0x500 [ 2308.484484] ? kill_litter_super+0xa0/0xa0 [ 2308.485375] ? devpts_remount+0x130/0x130 [ 2308.486260] mount_nodev+0x2e/0x120 [ 2308.487046] ? devpts_kill_sb+0x70/0x70 [ 2308.487925] legacy_get_tree+0x105/0x220 [ 2308.488799] ? ns_capable+0xd9/0x100 [ 2308.489589] vfs_get_tree+0x8e/0x2f0 [ 2308.490379] path_mount+0x13ba/0x20a0 [ 2308.491198] ? strncpy_from_user+0x9e/0x460 [ 2308.492147] ? finish_automount+0xa40/0xa40 [ 2308.493079] ? getname_flags.part.0+0x1dd/0x4f0 [ 2308.494095] __x64_sys_mount+0x27e/0x300 [ 2308.494956] ? path_mount+0x20a0/0x20a0 [ 2308.495830] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2308.496941] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2308.498030] do_syscall_64+0x33/0x40 [ 2308.498825] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2308.499949] RIP: 0033:0x7f9c93414b19 [ 2308.500748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2308.504690] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2308.506297] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2308.507868] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2308.509391] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2308.510926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2308.512472] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2308.538440] netlink: 264 bytes leftover after parsing attributes in process `syz-executor.2'. 03:22:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x11d, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:22:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x8}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:22:47 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) [ 2308.687077] netlink: 265 bytes leftover after parsing attributes in process `syz-executor.2'. 03:22:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x11e, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:22:47 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x49) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:47 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:22:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0xf}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:22:47 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x3b, 0x100, 0x70bd2a, 0x25dfdbfe, {0xa}, [@typed={0x8, 0x73, 0x0, 0x0, @ipv4=@rand_addr=0x3}]}, 0x1c}}, 0x20000000) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2308.825747] netlink: 266 bytes leftover after parsing attributes in process `syz-executor.2'. 03:22:47 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', &(0x7f0000000500)={0x8000, 0x10}, 0x18) bind$802154_raw(r0, &(0x7f0000000540)={0x24, @short={0x2, 0x2, 0xaaa3}}, 0x14) r1 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = fork() ptrace(0x10, r2) ptrace(0x11, r2) syz_open_procfs(r2, &(0x7f00000001c0)='net/rt6_stats\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x9bbb) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x2d}, &(0x7f0000000180)=""/153, 0x99, &(0x7f0000000240)=""/53, &(0x7f0000000300)=[r1, 0x0, r2, r1, 0xffffffffffffffff, r3, r1], 0x7, {r4}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:47 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000380)=""/196, &(0x7f0000000040)=0xc4) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close_range(r0, r0, 0x0) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/138}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:22:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x121, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:22:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x8f}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2308.965006] netlink: 269 bytes leftover after parsing attributes in process `syz-executor.2'. 03:22:47 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 72) 03:22:47 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:22:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0xf0}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:22:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x122, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2309.083472] FAULT_INJECTION: forcing a failure. [ 2309.083472] name failslab, interval 1, probability 0, space 0, times 0 [ 2309.085638] CPU: 0 PID: 22586 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2309.086942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2309.089044] Call Trace: [ 2309.089543] dump_stack+0x107/0x163 [ 2309.090226] should_fail.cold+0x5/0xa [ 2309.090924] ? create_object.isra.0+0x3a/0xa20 [ 2309.091805] should_failslab+0x5/0x10 [ 2309.092493] kmem_cache_alloc+0x5b/0x350 [ 2309.093251] ? mark_held_locks+0x9e/0xe0 [ 2309.093988] create_object.isra.0+0x3a/0xa20 [ 2309.094776] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2309.095700] kmem_cache_alloc_trace+0x151/0x360 [ 2309.096545] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2309.097425] __list_lru_init+0x403/0x7e0 [ 2309.098167] alloc_super+0x7f4/0x990 [ 2309.098843] sget+0x10b/0x500 [ 2309.099409] ? kill_litter_super+0xa0/0xa0 [ 2309.100177] ? devpts_remount+0x130/0x130 [ 2309.100941] mount_nodev+0x2e/0x120 [ 2309.101592] ? devpts_kill_sb+0x70/0x70 [ 2309.102305] legacy_get_tree+0x105/0x220 [ 2309.103027] ? ns_capable+0xd9/0x100 [ 2309.103704] vfs_get_tree+0x8e/0x2f0 [ 2309.104376] path_mount+0x13ba/0x20a0 [ 2309.105065] ? strncpy_from_user+0x9e/0x460 [ 2309.105835] ? finish_automount+0xa40/0xa40 [ 2309.106601] ? getname_flags.part.0+0x1dd/0x4f0 [ 2309.107448] __x64_sys_mount+0x27e/0x300 [ 2309.108184] ? path_mount+0x20a0/0x20a0 [ 2309.108894] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2309.109817] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2309.110736] do_syscall_64+0x33/0x40 [ 2309.111374] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2309.112282] RIP: 0033:0x7f9c93414b19 [ 2309.112944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2309.115314] netlink: 270 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2309.116119] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2309.116140] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2309.116151] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2309.116170] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2309.123094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2309.124373] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2322.298087] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2331.379255] netlink: 271 bytes leftover after parsing attributes in process `syz-executor.2'. 03:23:10 executing program 6: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, r1, r3, r0, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:23:10 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(r0) r2 = fork() ptrace(0x10, r2) ptrace(0x11, r2) syz_open_procfs(r2, &(0x7f00000001c0)='net/rt6_stats\x00') r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, r3) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, 0x400) execveat(r3, &(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000240)=[&(0x7f0000000140)='/dev/vcsu\x00', &(0x7f0000000180)='!-$\x00', &(0x7f0000000200)='net/rt6_stats\x00'], &(0x7f0000000380)=[&(0x7f0000000280)='\x00', &(0x7f00000002c0)=':$,\x00', &(0x7f0000000300)='net/rt6_stats\x00', &(0x7f0000000340)='/dev/vcsu\x00'], 0x0) 03:23:10 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 73) 03:23:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x123, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:23:10 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xfffffffc}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) io_setup(0x3, &(0x7f0000000180)=0x0) r2 = socket$inet(0x2, 0x4, 0xadbe306) r3 = signalfd(r0, &(0x7f0000000280)={[0x8]}, 0x8) write$P9_RREADLINK(r3, &(0x7f00000002c0)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) write$P9_RLOCK(r0, &(0x7f0000000240)={0x8, 0x35, 0x1, 0x3}, 0x8) io_submit(r1, 0x1, &(0x7f0000000200)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x1f, r2, &(0x7f0000000500)="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", 0x1000, 0x3, 0x0, 0x1, r0}]) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x834b, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x9bbb) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0xa12, 0x3, 0x5, 0x200}) 03:23:10 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:23:10 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) add_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)="c25704f3e6d940d250f8bcc08d92493fd20563c84eafccb677c7eaa6884d23f0b3bb86e6baa053340abd810450460fa58ee3e22137a97196970cdcf9653eafc766213f84e0e382bdce6bbd23df95abc10bf4ee3349509a82e4de1fc1d5cd063e527321da1c32dd6447125c0ac25a5098c87ce78fdd905b89fc29c2191dc90ebfa5f6ab59e3093a9eba2f956005fc2b131fc09358d1dc7e5a2457e0317b18f5702228bfaaf031286e6561010a79fc142ac7f173171fe5625cf566760d5b7646dda61af033456bfa6f43436e7052836fc634ab1ba2860fe9", 0xd7, r0) r1 = request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180)='syz', r0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x200, 0x142) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x1000) request_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000002c0)='dns_resolver\x00', r1) 03:23:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x14c}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2331.412306] FAULT_INJECTION: forcing a failure. [ 2331.412306] name failslab, interval 1, probability 0, space 0, times 0 [ 2331.414951] CPU: 1 PID: 22737 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2331.416465] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2331.418943] Call Trace: [ 2331.419521] dump_stack+0x107/0x163 [ 2331.420337] should_fail.cold+0x5/0xa [ 2331.421170] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2331.422280] should_failslab+0x5/0x10 [ 2331.423109] kmem_cache_alloc_trace+0x55/0x360 [ 2331.424123] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2331.425242] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2331.426320] __list_lru_init+0x403/0x7e0 [ 2331.427216] alloc_super+0x7f4/0x990 [ 2331.428052] sget+0x10b/0x500 [ 2331.428742] ? kill_litter_super+0xa0/0xa0 [ 2331.429664] ? devpts_remount+0x130/0x130 [ 2331.430575] mount_nodev+0x2e/0x120 [ 2331.431369] ? devpts_kill_sb+0x70/0x70 [ 2331.432249] legacy_get_tree+0x105/0x220 [ 2331.433138] ? ns_capable+0xd9/0x100 [ 2331.433950] vfs_get_tree+0x8e/0x2f0 [ 2331.434767] path_mount+0x13ba/0x20a0 [ 2331.435606] ? strncpy_from_user+0x9e/0x460 [ 2331.436570] ? finish_automount+0xa40/0xa40 [ 2331.437514] ? getname_flags.part.0+0x1dd/0x4f0 [ 2331.438553] __x64_sys_mount+0x27e/0x300 [ 2331.439439] ? path_mount+0x20a0/0x20a0 [ 2331.440331] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2331.441476] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2331.442604] do_syscall_64+0x33/0x40 [ 2331.443418] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2331.444542] RIP: 0033:0x7f9c93414b19 [ 2331.445355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2331.449399] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2331.451054] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2331.452614] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2331.454175] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2331.455718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2331.457284] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:23:10 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:23:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x124, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:23:10 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 74) 03:23:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0xf00}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2331.654457] netlink: 272 bytes leftover after parsing attributes in process `syz-executor.2'. 03:23:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x4c01}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2331.717893] FAULT_INJECTION: forcing a failure. [ 2331.717893] name failslab, interval 1, probability 0, space 0, times 0 [ 2331.720543] CPU: 1 PID: 23161 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2331.722045] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2331.724528] Call Trace: [ 2331.725112] dump_stack+0x107/0x163 [ 2331.725908] should_fail.cold+0x5/0xa [ 2331.726737] ? create_object.isra.0+0x3a/0xa20 [ 2331.727739] should_failslab+0x5/0x10 [ 2331.728597] kmem_cache_alloc+0x5b/0x350 [ 2331.729500] create_object.isra.0+0x3a/0xa20 03:23:10 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) readahead(r0, 0x0, 0x75a) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2331.730461] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2331.731702] kmem_cache_alloc_trace+0x151/0x360 [ 2331.732761] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2331.733842] __list_lru_init+0x403/0x7e0 [ 2331.734746] alloc_super+0x7f4/0x990 [ 2331.735573] sget+0x10b/0x500 [ 2331.736281] ? kill_litter_super+0xa0/0xa0 [ 2331.737205] ? devpts_remount+0x130/0x130 [ 2331.738124] mount_nodev+0x2e/0x120 [ 2331.738921] ? devpts_kill_sb+0x70/0x70 [ 2331.739788] legacy_get_tree+0x105/0x220 [ 2331.740689] ? ns_capable+0xd9/0x100 [ 2331.741513] vfs_get_tree+0x8e/0x2f0 [ 2331.742331] path_mount+0x13ba/0x20a0 [ 2331.743174] ? strncpy_from_user+0x9e/0x460 [ 2331.744136] ? finish_automount+0xa40/0xa40 [ 2331.745084] ? getname_flags.part.0+0x1dd/0x4f0 [ 2331.746122] __x64_sys_mount+0x27e/0x300 [ 2331.747013] ? path_mount+0x20a0/0x20a0 [ 2331.747890] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2331.749058] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2331.750199] do_syscall_64+0x33/0x40 [ 2331.751021] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2331.752157] RIP: 0033:0x7f9c93414b19 [ 2331.752977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2331.756997] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2331.758666] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2331.760245] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2331.761803] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2331.763376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2331.764905] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2344.593157] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:23:32 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 75) 03:23:32 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x460000, 0x1bb) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f00000001c0)=0x8, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x1, {0x40, 0x4, 0x1}}, 0x14) 03:23:32 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0x3f}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) fallocate(r1, 0x1, 0x4, 0x1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:23:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x8f00}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:23:32 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:23:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x125, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2353.669398] netlink: 273 bytes leftover after parsing attributes in process `syz-executor.2'. 03:23:32 executing program 6: r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000540)='5', 0x1, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) request_key(&(0x7f0000000280)='logon\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x29aac2, 0x0) write$P9_RWSTAT(r4, &(0x7f0000000240)={0x7}, 0x7) preadv2(r4, &(0x7f0000001580)=[{&(0x7f0000000140)=""/251, 0xfb}, {&(0x7f0000000380)=""/198, 0xc6}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000480)=""/188, 0xbc}], 0x5, 0xa70, 0x3, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r2, 0x1) r5 = add_key(&(0x7f00000016c0)='user\x00', &(0x7f0000001700)={'syz', 0x3}, &(0x7f0000001740)="9fde56ec63b0f7a651ee94d78a5ce76114536b44fa75695bbe3088c6ce66c5a284fa52f6c9a581e5292fb9c81e06476927761e9b8caf8a030c692ba22a244491b65becb59e94657a427964c91879a5d012fb61f4fc3e720490e9ce080fdf26b1f4327cb5128ae04062df13894df7211a5936853d87ff52d84710223ae32bb543a68e794de26ec68c92f9287108011211bbbc0064fe66a5b7d9f96c0bc8705ce6621aa06b9e468c7fe0e627e9508f17d41d57afb3c23769fa", 0xb8, r2) request_key(&(0x7f0000001600)='asymmetric\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)='logon\x00', r5) add_key$fscrypt_v1(&(0x7f0000001800), &(0x7f0000001840)={'fscrypt:', @auto=[0x38, 0x63, 0x65, 0x38, 0x66, 0x64, 0x30, 0x39, 0x65, 0x37, 0x66, 0x35, 0x66, 0x30, 0x62, 0x39]}, &(0x7f0000001880)={0x0, "332c361f50a15dc3d8e36d24fd418f78c25f15c8ebefcf9314f67b1707aba2a1131e7b457cebc05d21f406fb82f0b634e46ad386b7ed1dd9c2b01f652c23b2fd", 0x40}, 0x48, r5) 03:23:32 executing program 0: clone3(&(0x7f0000000080)={0x3042380, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:23:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0xf000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2353.715811] FAULT_INJECTION: forcing a failure. [ 2353.715811] name failslab, interval 1, probability 0, space 0, times 0 [ 2353.718715] CPU: 1 PID: 23280 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2353.720494] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2353.723396] Call Trace: [ 2353.724082] dump_stack+0x107/0x163 [ 2353.725024] should_fail.cold+0x5/0xa [ 2353.725998] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2353.727302] should_failslab+0x5/0x10 [ 2353.728306] kmem_cache_alloc_trace+0x55/0x360 [ 2353.729485] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2353.730788] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2353.732030] __list_lru_init+0x403/0x7e0 [ 2353.733082] alloc_super+0x7f4/0x990 [ 2353.734053] sget+0x10b/0x500 [ 2353.734869] ? kill_litter_super+0xa0/0xa0 [ 2353.735964] ? devpts_remount+0x130/0x130 [ 2353.737058] mount_nodev+0x2e/0x120 [ 2353.737997] ? devpts_kill_sb+0x70/0x70 [ 2353.739022] legacy_get_tree+0x105/0x220 [ 2353.740066] ? ns_capable+0xd9/0x100 [ 2353.740914] vfs_get_tree+0x8e/0x2f0 [ 2353.741740] path_mount+0x13ba/0x20a0 [ 2353.742590] ? strncpy_from_user+0x9e/0x460 [ 2353.743550] ? finish_automount+0xa40/0xa40 [ 2353.744526] ? getname_flags.part.0+0x1dd/0x4f0 [ 2353.745577] __x64_sys_mount+0x27e/0x300 [ 2353.746480] ? path_mount+0x20a0/0x20a0 [ 2353.747369] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2353.748552] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2353.749697] do_syscall_64+0x33/0x40 [ 2353.750527] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2353.751659] RIP: 0033:0x7f9c93414b19 [ 2353.752494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2353.756589] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2353.758276] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2353.759859] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2353.761449] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2353.763033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2353.764641] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:23:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x126, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:23:32 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:23:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0xffff}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:23:32 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000380), 0x1, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000400)={0x1, 0x0, 0x1000, 0xbff, &(0x7f0000000640)="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", 0x0, 0x0, &(0x7f00000003c0)}) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x9, @dev, 0x1}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x6) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) preadv(r3, &(0x7f00000014c0)=[{&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000280)=""/207, 0xcf}, {&(0x7f0000000500)=""/107, 0x6b}, {&(0x7f0000001240)=""/181, 0xb5}, {&(0x7f0000001300)=""/165, 0xa5}, {&(0x7f0000001540)=""/116, 0x74}, {&(0x7f00000013c0)=""/233, 0xe9}], 0x7, 0x20, 0xc3) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0xca, 0x4, 0xfc, 0x0, 0x1c, 0x850, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x44000, 0x100000000, 0xfff, 0x1, 0x5, 0x400, 0x3, 0x0, 0x3, 0x0, 0xd3}, 0xffffffffffffffff, 0x3, r2, 0x8) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000040)={0x80, 0x0, 0x2, 0x7, 0x3, [0xfffffffc, 0x6f, 0xd98e, 0x6]}) close(0xffffffffffffffff) [ 2353.912623] netlink: 274 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2368.767611] kmemleak: 75 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:23:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:23:56 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)=""/245, 0xf5) 03:23:56 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:23:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x127, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:23:56 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 76) 03:23:56 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:23:56 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x12000, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000300)={0x40, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, r0]}, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r3, 0x0, 0x9bbb) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@l2={0x1f, 0x0, @none}, &(0x7f0000000280)=0x80) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) openat(r1, &(0x7f0000000040)='./file1\x00', 0x111001, 0x180) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2377.820424] FAULT_INJECTION: forcing a failure. [ 2377.820424] name failslab, interval 1, probability 0, space 0, times 0 [ 2377.821737] CPU: 1 PID: 23618 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2377.822518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2377.823777] Call Trace: [ 2377.824078] dump_stack+0x107/0x163 [ 2377.824508] should_fail.cold+0x5/0xa [ 2377.824943] ? create_object.isra.0+0x3a/0xa20 [ 2377.825457] should_failslab+0x5/0x10 [ 2377.825892] kmem_cache_alloc+0x5b/0x350 [ 2377.826366] ? mark_held_locks+0x9e/0xe0 [ 2377.826831] create_object.isra.0+0x3a/0xa20 [ 2377.827337] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2377.827930] kmem_cache_alloc_trace+0x151/0x360 [ 2377.828469] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2377.829048] __list_lru_init+0x403/0x7e0 [ 2377.829520] alloc_super+0x7f4/0x990 [ 2377.829944] sget+0x10b/0x500 [ 2377.830299] ? kill_litter_super+0xa0/0xa0 [ 2377.830784] ? devpts_remount+0x130/0x130 [ 2377.831257] mount_nodev+0x2e/0x120 [ 2377.831686] ? devpts_kill_sb+0x70/0x70 [ 2377.832145] legacy_get_tree+0x105/0x220 [ 2377.832644] ? ns_capable+0xd9/0x100 [ 2377.833071] vfs_get_tree+0x8e/0x2f0 [ 2377.833514] path_mount+0x13ba/0x20a0 [ 2377.833952] ? strncpy_from_user+0x9e/0x460 [ 2377.834452] ? finish_automount+0xa40/0xa40 [ 2377.834944] ? getname_flags.part.0+0x1dd/0x4f0 [ 2377.835490] __x64_sys_mount+0x27e/0x300 [ 2377.835952] ? path_mount+0x20a0/0x20a0 [ 2377.836414] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2377.837035] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2377.837631] do_syscall_64+0x33/0x40 [ 2377.838060] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2377.838666] RIP: 0033:0x7f9c93414b19 03:23:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x40, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000040), 0x0, 0x400000) pwrite64(r1, &(0x7f0000000140)="e95323163c945748dab7ddbe503095cf536d46d9b2cd9cdddf7e21715e94f96c2487ab2a0ea7bc966a3c105ccf63534c42e01fc5aac9dc470faa96d72b19cb0fe5f3a46a089cc125a0aaab0665464fe4aa5d83cc41772a7ccf78f5bbb15db7a35818e69e42964cbd0009c1b5aed4dfbdb73cd07c601345a869b16e37c0881dda4740e8a5f4870e0534ba327b2ee608f7ec04598dc6217b89f06db9b56351f3b70503", 0xa2, 0xffff) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2377.839092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2377.841453] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2377.842352] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2377.843177] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2377.844018] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2377.844858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2377.845696] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2377.848395] netlink: 275 bytes leftover after parsing attributes in process `syz-executor.2'. 03:23:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:23:56 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:23:56 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x1000) 03:23:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x161, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:23:56 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:23:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x8}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2391.446456] kmemleak: 34 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:24:17 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:24:17 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) r1 = openat(0xffffffffffffff9c, 0x0, 0x208002, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r2 = openat(r1, &(0x7f0000000400)='./file1\x00', 0x800, 0x12) keyctl$revoke(0x3, r0) openat(r2, &(0x7f0000001700)='./file1\x00', 0x4240, 0xf) close(0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000540)='./file1\x00', 0x400400, 0x50) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000001600)={@in6={{0xa, 0x8000, 0x14b1, @mcast2, 0x9}}, 0x0, 0x0, 0x41, 0x0, "a868f88e43748309c4ebcefd5ca8e0c869ef960c1951eefd232e038bf8c4ce1ec906c880c777fc9c367d603831892693dce7b7ddf78f15a8201c9562063f96a706e3b5ac88b33c42ac371e5a481793b7"}, 0xd8) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r5 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r5, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$BTRFS_IOC_TREE_SEARCH(r5, 0xd0009411, &(0x7f0000000580)={{0x0, 0x5, 0x3, 0xd8, 0x3, 0x1000, 0x4, 0x4, 0x9, 0x40, 0x40, 0x0, 0x1, 0xffff, 0x5}}) execveat(r4, &(0x7f0000000100)='./file1\x00', &(0x7f0000000300)=[&(0x7f0000000180)='\'(.:\x00', &(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)='syz', &(0x7f0000000240)='>\x00', &(0x7f00000002c0)='.*\'^/]\x15)@)]%$\x00'], &(0x7f00000004c0)=[&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)='\'\x00', &(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000440)='#\x00', &(0x7f0000000480)='syz'], 0x100) pipe2(&(0x7f0000001580)={0xffffffffffffffff}, 0x80800) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000015c0)=ANY=[@ANYBLOB='\t', @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) 03:24:17 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:24:17 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file1\x00'}) r2 = syz_open_procfs(r0, &(0x7f0000000240)='map_files\x00') openat(r2, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x2c, 0x400, 0x70bd2b, 0x25dfdbfc, {0x1e}}, 0x14}, 0x1, 0x0, 0x0, 0x24004085}, 0x8000) pipe(&(0x7f00000002c0)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r3, &(0x7f0000000240)={0x7}, 0x7) fchmodat(r3, &(0x7f0000000300)='./file1\x00', 0x1) [ 2398.663259] FAULT_INJECTION: forcing a failure. [ 2398.663259] name failslab, interval 1, probability 0, space 0, times 0 [ 2398.665784] CPU: 1 PID: 24272 Comm: syz-executor.5 Not tainted 5.10.123 #1 03:24:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0xf}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:24:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x2c0, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:24:17 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, &(0x7f0000000040)=0x80, 0x800) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000180)=""/113, &(0x7f0000000200)=0x71) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:24:17 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 77) [ 2398.667211] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2398.669724] Call Trace: [ 2398.670285] dump_stack+0x107/0x163 [ 2398.671048] should_fail.cold+0x5/0xa [ 2398.671832] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2398.672902] should_failslab+0x5/0x10 [ 2398.673704] kmem_cache_alloc_trace+0x55/0x360 [ 2398.674669] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2398.675740] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2398.676736] __list_lru_init+0x403/0x7e0 [ 2398.677603] alloc_super+0x7f4/0x990 [ 2398.678376] sget+0x10b/0x500 [ 2398.679024] ? kill_litter_super+0xa0/0xa0 [ 2398.679892] ? devpts_remount+0x130/0x130 [ 2398.680750] mount_nodev+0x2e/0x120 [ 2398.681506] ? devpts_kill_sb+0x70/0x70 [ 2398.682324] legacy_get_tree+0x105/0x220 [ 2398.683160] ? ns_capable+0xd9/0x100 [ 2398.683930] vfs_get_tree+0x8e/0x2f0 [ 2398.684697] path_mount+0x13ba/0x20a0 [ 2398.685512] ? strncpy_from_user+0x9e/0x460 [ 2398.686402] ? finish_automount+0xa40/0xa40 [ 2398.687292] ? getname_flags.part.0+0x1dd/0x4f0 [ 2398.688267] __x64_sys_mount+0x27e/0x300 [ 2398.689111] ? path_mount+0x20a0/0x20a0 [ 2398.689937] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2398.691020] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2398.692090] do_syscall_64+0x33/0x40 [ 2398.692855] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2398.693918] RIP: 0033:0x7f9c93414b19 [ 2398.694686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2398.698491] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2398.700060] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2398.701545] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2398.703020] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2398.704493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2398.705985] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:24:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x8f}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:24:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0xec0, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:24:17 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 78) 03:24:17 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:24:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0xf0}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2398.882276] FAULT_INJECTION: forcing a failure. [ 2398.882276] name failslab, interval 1, probability 0, space 0, times 0 [ 2398.884056] CPU: 0 PID: 24637 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2398.885132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2398.886892] Call Trace: [ 2398.887308] dump_stack+0x107/0x163 [ 2398.887882] should_fail.cold+0x5/0xa [ 2398.888477] ? create_object.isra.0+0x3a/0xa20 [ 2398.889210] should_failslab+0x5/0x10 [ 2398.889800] kmem_cache_alloc+0x5b/0x350 [ 2398.890434] ? mark_held_locks+0x9e/0xe0 [ 2398.891102] create_object.isra.0+0x3a/0xa20 [ 2398.891811] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2398.892619] kmem_cache_alloc_trace+0x151/0x360 [ 2398.893358] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2398.894125] __list_lru_init+0x403/0x7e0 [ 2398.894769] alloc_super+0x7f4/0x990 [ 2398.895381] sget+0x10b/0x500 [ 2398.895884] ? kill_litter_super+0xa0/0xa0 [ 2398.896570] ? devpts_remount+0x130/0x130 [ 2398.897240] mount_nodev+0x2e/0x120 [ 2398.897816] ? devpts_kill_sb+0x70/0x70 [ 2398.898421] legacy_get_tree+0x105/0x220 [ 2398.899051] ? ns_capable+0xd9/0x100 [ 2398.899646] vfs_get_tree+0x8e/0x2f0 [ 2398.900242] path_mount+0x13ba/0x20a0 [ 2398.900839] ? strncpy_from_user+0x9e/0x460 [ 2398.901535] ? finish_automount+0xa40/0xa40 [ 2398.902193] ? getname_flags.part.0+0x1dd/0x4f0 [ 2398.902954] __x64_sys_mount+0x27e/0x300 [ 2398.903575] ? path_mount+0x20a0/0x20a0 [ 2398.904196] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2398.905018] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2398.905836] do_syscall_64+0x33/0x40 [ 2398.906404] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2398.907209] RIP: 0033:0x7f9c93414b19 [ 2398.907785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2398.910696] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2398.911875] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2398.913005] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2398.914166] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2398.915322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2398.916467] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:24:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x33fe0, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:24:17 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x80049367, &(0x7f0000000040)=0xd89) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:24:17 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(r0, &(0x7f0000000040)='./file1\x00', 0x80800, 0x100) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:24:17 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0xeb4affeeb2feb6e3, 0x0) request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x30222000, 0x0, 0x0, 0x0, {0x12}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2412.303200] kmemleak: 30 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:24:39 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180)='\'$$]]}@[\'-$\\-\x00', 0xfffffffffffffff9) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='$)\x00', r0) add_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000380)="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", 0x1000, r1) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:24:39 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:24:39 executing program 6: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r1) add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:24:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x20000628, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:24:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x14c}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:24:39 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x4001, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x8}}, './file1\x00'}) socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x17c, 0x33, 0x0, 0x70bd26, 0x25dfdbfd, {0x14}, [@generic="6e51d7b1197e2f0d50c2dd15d1a88c8b0e99e674e50da356866a226590f23fa62b2438d5aad6dc7068a7b1576033677bfab392c3a67ddb293970a2f5a8377c4dc7132f79", @nested={0x28, 0x7f, 0x0, 0x1, [@typed={0xc, 0x94, 0x0, 0x0, @u64=0x8}, @typed={0x8, 0x7c, 0x0, 0x0, @uid=r3}, @generic="a4aa281a60536b7bede61866d293cc81"]}, @typed={0xf3, 0x7, 0x0, 0x0, @binary="41a3fe1535029b86e2ad7caa2aeaaf27213377581e4597a36e75e09ad80bcb7e667229c0f812d38deafc2f71bbfa6ab0dcb454aaffc45e69e93921c68770594275b0ec3992bce7cf76f0858c2484e5a37f0c5c1c68f53cf1590eaa32eee08466fb41c7e144f737077547dc86b6461d5f0388223ee2b0555dcaf5c12de5a5e938a2ba8e537b038dd75aa13a59a43e9c9e8fa282ee55c2c53899aea392eb4389a1f71f2002326efdf67f6e451f44a2213c0c192500567ce3c0bb8cae3f008a7512f3a3dcaab6e477dc6a47411909fe1f4596b1138250e08417ccc65677178802ff9ed3e61b4bf0132240c1e3098d0dfb"}, @typed={0x8, 0x45, 0x0, 0x0, @uid=0xee01}]}, 0x17c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x11) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat(r2, &(0x7f0000000140)='./file1\x00', 0x80400, 0x62) 03:24:39 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 79) 03:24:39 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file1\x00'}) fchmodat(r1, &(0x7f00000002c0)='./file1\x00', 0xd1) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000240)={0x7}, 0x7) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r3, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000180)={"9f57e262fb7f69a7318c8ac58c4b1598", 0x0, 0x0, {0x75, 0x6}, {0x1000000000000, 0x400}, 0x0, [0x1, 0x6, 0xdf, 0x2, 0x4, 0x78407e2, 0x3, 0x36, 0xffffffffffffff30, 0x7f, 0x8, 0x8, 0x0, 0x9, 0x100, 0xfff]}) ioctl$BTRFS_IOC_WAIT_SYNC(r2, 0x40089416, &(0x7f0000000040)=r4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r6, r5, 0x0, 0x9bbb) fcntl$setstatus(r6, 0x4, 0x46000) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2421.071465] FAULT_INJECTION: forcing a failure. [ 2421.071465] name failslab, interval 1, probability 0, space 0, times 0 [ 2421.073922] CPU: 1 PID: 24991 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2421.075308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2421.077657] Call Trace: [ 2421.078206] dump_stack+0x107/0x163 [ 2421.078961] should_fail.cold+0x5/0xa [ 2421.079750] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2421.080796] should_failslab+0x5/0x10 [ 2421.081596] kmem_cache_alloc_trace+0x55/0x360 [ 2421.082539] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2421.083593] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2421.084617] __list_lru_init+0x403/0x7e0 [ 2421.085489] alloc_super+0x7f4/0x990 [ 2421.086266] sget+0x10b/0x500 [ 2421.086915] ? kill_litter_super+0xa0/0xa0 [ 2421.087792] ? devpts_remount+0x130/0x130 [ 2421.088651] mount_nodev+0x2e/0x120 [ 2421.089409] ? devpts_kill_sb+0x70/0x70 [ 2421.090231] legacy_get_tree+0x105/0x220 [ 2421.091070] ? ns_capable+0xd9/0x100 [ 2421.091841] vfs_get_tree+0x8e/0x2f0 [ 2421.092605] path_mount+0x13ba/0x20a0 [ 2421.093415] ? strncpy_from_user+0x9e/0x460 [ 2421.094281] ? finish_automount+0xa40/0xa40 [ 2421.095175] ? getname_flags.part.0+0x1dd/0x4f0 [ 2421.096170] __x64_sys_mount+0x27e/0x300 [ 2421.097011] ? path_mount+0x20a0/0x20a0 [ 2421.097854] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2421.098940] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2421.100040] do_syscall_64+0x33/0x40 [ 2421.100811] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2421.101910] RIP: 0033:0x7f9c93414b19 [ 2421.102679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2421.106550] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2421.108120] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2421.109588] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2421.111052] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2421.112517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2421.113998] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:24:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x7ffff000, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:24:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0xf00}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:24:40 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:24:40 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 80) 03:24:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0xfffffdef, 0x28, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:24:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x4c01}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:24:40 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', &(0x7f0000000200)=[&(0x7f0000000100)='[\xe5\x0e]%&{-+\x00', &(0x7f0000000140)='/}*\x00', &(0x7f0000000180)=':/\x00', &(0x7f00000001c0)='%^{+[]\x00'], &(0x7f0000000380)=[&(0x7f0000000240)='-\\-\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='\x00', 0xfffffffffffffffe, &(0x7f0000000300)='\x00', &(0x7f0000000340)='.({u\x00'], 0x800) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file1/file0\x00', 0x220000, 0x80) 03:24:40 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x40000000}) [ 2421.357923] FAULT_INJECTION: forcing a failure. [ 2421.357923] name failslab, interval 1, probability 0, space 0, times 0 [ 2421.359333] CPU: 0 PID: 25406 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2421.360160] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2421.361497] Call Trace: [ 2421.361815] dump_stack+0x107/0x163 [ 2421.362256] should_fail.cold+0x5/0xa [ 2421.362712] ? create_object.isra.0+0x3a/0xa20 [ 2421.363251] should_failslab+0x5/0x10 [ 2421.363704] kmem_cache_alloc+0x5b/0x350 [ 2421.364192] ? mark_held_locks+0x9e/0xe0 [ 2421.364692] create_object.isra.0+0x3a/0xa20 [ 2421.365213] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2421.365833] kmem_cache_alloc_trace+0x151/0x360 [ 2421.366390] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2421.367008] __list_lru_init+0x403/0x7e0 [ 2421.367536] alloc_super+0x7f4/0x990 [ 2421.368007] sget+0x10b/0x500 [ 2421.368396] ? kill_litter_super+0xa0/0xa0 [ 2421.368933] ? devpts_remount+0x130/0x130 [ 2421.369468] mount_nodev+0x2e/0x120 [ 2421.369928] ? devpts_kill_sb+0x70/0x70 [ 2421.370414] legacy_get_tree+0x105/0x220 [ 2421.370918] ? ns_capable+0xd9/0x100 [ 2421.371375] vfs_get_tree+0x8e/0x2f0 [ 2421.371846] path_mount+0x13ba/0x20a0 [ 2421.372314] ? strncpy_from_user+0x9e/0x460 [ 2421.372869] ? finish_automount+0xa40/0xa40 [ 2421.373403] ? getname_flags.part.0+0x1dd/0x4f0 [ 2421.374012] __x64_sys_mount+0x27e/0x300 [ 2421.374511] ? path_mount+0x20a0/0x20a0 [ 2421.375016] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2421.375671] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2421.376311] do_syscall_64+0x33/0x40 [ 2421.376776] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2421.377424] RIP: 0033:0x7f9c93414b19 [ 2421.377892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2421.380204] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2421.381158] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2421.382063] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2421.382951] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2421.383848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2421.384733] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2435.502921] kmemleak: 43 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2442.939086] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=15 sclass=netlink_xfrm_socket pid=25637 comm=syz-executor.2 03:25:01 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:25:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0xf, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:25:01 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000011c0)) symlinkat(&(0x7f0000000040)='./file1\x00', r0, &(0x7f0000001180)='./file1/../file0\x00') r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000000180)={{r2}, 0x0, 0x10, @unused=[0x178b40a2, 0x1, 0x3, 0x20], @devid}) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:25:01 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:25:01 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x200000500, 0x0, 0x0, 0x0, {0x2f}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:25:01 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 81) 03:25:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x8f00}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:25:01 executing program 3: request_key(&(0x7f0000000280)='.dead\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xfffffffffffffffb) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x1}, 0x100000}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback, 0x80000000}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x3ff, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) dup2(r0, r3) [ 2442.962100] FAULT_INJECTION: forcing a failure. [ 2442.962100] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.964664] CPU: 0 PID: 25631 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2442.966112] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2442.968416] Call Trace: [ 2442.968969] dump_stack+0x107/0x163 [ 2442.969749] should_fail.cold+0x5/0xa [ 2442.970543] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2442.971591] should_failslab+0x5/0x10 [ 2442.972371] kmem_cache_alloc_trace+0x55/0x360 [ 2442.973324] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2442.974399] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2442.975434] __list_lru_init+0x403/0x7e0 [ 2442.976305] alloc_super+0x7f4/0x990 [ 2442.977107] sget+0x10b/0x500 [ 2442.977778] ? kill_litter_super+0xa0/0xa0 [ 2442.978665] ? devpts_remount+0x130/0x130 [ 2442.979555] mount_nodev+0x2e/0x120 [ 2442.980339] ? devpts_kill_sb+0x70/0x70 [ 2442.981161] legacy_get_tree+0x105/0x220 [ 2442.982015] ? ns_capable+0xd9/0x100 [ 2442.982800] vfs_get_tree+0x8e/0x2f0 [ 2442.983582] path_mount+0x13ba/0x20a0 [ 2442.984375] ? strncpy_from_user+0x9e/0x460 [ 2442.985272] ? finish_automount+0xa40/0xa40 [ 2442.986184] ? getname_flags.part.0+0x1dd/0x4f0 [ 2442.987187] __x64_sys_mount+0x27e/0x300 [ 2442.988031] ? path_mount+0x20a0/0x20a0 [ 2442.988867] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2442.989986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.991065] do_syscall_64+0x33/0x40 [ 2442.991830] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2442.992903] RIP: 0033:0x7f9c93414b19 [ 2442.993683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.997545] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2442.999112] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2443.000576] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2443.002053] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2443.003518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2443.004985] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:25:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0xf000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:25:01 executing program 0: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040), &(0x7f0000000140), 0x2, 0x2) fcntl$getflags(r0, 0x3) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:25:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x10, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:25:01 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:25:01 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 82) 03:25:02 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) fsetxattr$security_selinux(r2, &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:lib_t:s0\x00', 0x1b, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) fcntl$setown(r2, 0x8, r0) [ 2443.171941] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. 03:25:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0xffff}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:25:02 executing program 1: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) [ 2443.286545] audit: type=1400 audit(1655609102.128:12): avc: denied { relabelto } for pid=26023 comm="syz-executor.7" name="TCPv6" dev="sockfs" ino=36201 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=tcp_socket permissive=1 [ 2443.313573] FAULT_INJECTION: forcing a failure. [ 2443.313573] name failslab, interval 1, probability 0, space 0, times 0 [ 2443.315998] CPU: 0 PID: 26011 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2443.317423] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2443.319762] Call Trace: [ 2443.320313] dump_stack+0x107/0x163 [ 2443.321077] should_fail.cold+0x5/0xa [ 2443.321880] ? create_object.isra.0+0x3a/0xa20 [ 2443.322828] should_failslab+0x5/0x10 [ 2443.323610] kmem_cache_alloc+0x5b/0x350 [ 2443.324457] create_object.isra.0+0x3a/0xa20 [ 2443.325364] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2443.326434] kmem_cache_alloc_trace+0x151/0x360 [ 2443.327408] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2443.328428] __list_lru_init+0x403/0x7e0 [ 2443.329281] alloc_super+0x7f4/0x990 [ 2443.330081] sget+0x10b/0x500 [ 2443.330737] ? kill_litter_super+0xa0/0xa0 [ 2443.331632] ? devpts_remount+0x130/0x130 [ 2443.332501] mount_nodev+0x2e/0x120 [ 2443.333261] ? devpts_kill_sb+0x70/0x70 [ 2443.334101] legacy_get_tree+0x105/0x220 [ 2443.334937] ? ns_capable+0xd9/0x100 [ 2443.335712] vfs_get_tree+0x8e/0x2f0 [ 2443.336483] path_mount+0x13ba/0x20a0 [ 2443.337279] ? strncpy_from_user+0x9e/0x460 [ 2443.338177] ? finish_automount+0xa40/0xa40 [ 2443.339073] ? getname_flags.part.0+0x1dd/0x4f0 [ 2443.340057] __x64_sys_mount+0x27e/0x300 [ 2443.340897] ? path_mount+0x20a0/0x20a0 [ 2443.341735] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2443.342814] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2443.343893] do_syscall_64+0x33/0x40 [ 2443.344667] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2443.345737] RIP: 0033:0x7f9c93414b19 [ 2443.346508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2443.350328] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2443.351891] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2443.353355] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2443.354828] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2443.356296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2443.357770] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2456.726518] kmemleak: 26 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:25:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:25:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x11, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:25:24 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 83) 03:25:24 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000015c0)={0x44228000, &(0x7f00000003c0)=0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000440)=0x0, {0x29}, &(0x7f0000000480)=""/248, 0xf8, &(0x7f0000000580)=""/4096, &(0x7f0000001580)=[r1, r1, r1, r1], 0x4, {r0}}, 0x58) r4 = fork() ptrace(0x10, r4) ptrace(0x11, r4) syz_open_procfs(r4, &(0x7f00000001c0)='net/rt6_stats\x00') r5 = fork() ptrace(0x10, r5) ptrace(0x11, r5) syz_open_procfs(r5, &(0x7f00000001c0)='net/rt6_stats\x00') r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) clone3(&(0x7f0000001680)={0x80, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x38}, &(0x7f0000000240)=""/71, 0x47, &(0x7f00000002c0)=""/254, &(0x7f0000001700)=[r1, r1, r1, r3, r4, r5, r5, r5, 0x0], 0x9, {r6}}, 0x58) writev(r2, &(0x7f0000001940)=[{&(0x7f0000001700)}, {&(0x7f0000001740)="db3ff0dc4f9dbfdc72d622bfc19b6e13331c7d8f0ac294351b45d75bee7a2c6ba47c25d591d23a74154aba7582abf1359b70267fef13a77b62b21e801169fd655053", 0x42}, {&(0x7f00000017c0)="2c94f2be5a93ddc2d196509849f7b9e2ff75a85bf3bd8661d8df15422307412fa66b1f3302e141bc901a46d9ecd6bbaaa617ab06c7f25a846462a8493b3859691214043d7f528509dd34397a657512dcad6cf448d3267d145b1922395dfd6c7323d850c6e9170a7d9fb38c342eef5676d9a077d666bc476a5bf0aac95e1b5e4efff6380babc1d318b6453f0092d19a95d481a76ca2fc6840f92752202682eb944b97837ce20ec5f268cb05186514d379bd6b10625a", 0xb5}, {&(0x7f0000001880)="bb111b96165d895b3a9890eeeb8f2a21c404ff8c9c9d6a891dfb910992ec890e16b1b1c32b87af56f328bcc206e52879e2a573a0ec52d67fc93bb41452b58b48cc9889d0f7fa5e3f9f888acf2382fef54764c6d2e90c048cfbf8d472726b663ed5b586fa5889c744b27286ab0dc53144b86faaaca3d81931add5d485172906efb617b451b3d31aed80ea6057ff815c67c475cd11b5eb34371a0ed712ba04a89ccf91280d2b37a34fd9fed1300bff88bccf6d8b970344c2a3200c0d", 0xbb}], 0x4) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000040)=0xe6) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:25:24 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) pidfd_send_signal(r1, 0x29, &(0x7f0000000100)={0x20, 0x5, 0x6}, 0x0) r2 = pidfd_open(r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000180)) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r4, r3, 0x0, 0x9bbb) pidfd_getfd(r3, r2, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2465.191781] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.2'. 03:25:24 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r1}) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "198be94fbb35c897dcf37f04ebd4f9f4ecd9bf010e61f00f837f8e57242cba52965f202765246dad807ffa6de0379fed4c517d5e92f64077beb89fbb4c6a4ca9", 0x3f}, 0x48, r1) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180)='#]\xa9@\x00', r1) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:25:24 executing program 1: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:25:24 executing program 6: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r1) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(r1, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2465.240166] FAULT_INJECTION: forcing a failure. [ 2465.240166] name failslab, interval 1, probability 0, space 0, times 0 [ 2465.242602] CPU: 1 PID: 26190 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2465.244044] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2465.246401] Call Trace: [ 2465.246950] dump_stack+0x107/0x163 [ 2465.247704] should_fail.cold+0x5/0xa [ 2465.248491] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2465.249537] should_failslab+0x5/0x10 [ 2465.250326] kmem_cache_alloc_trace+0x55/0x360 [ 2465.251285] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2465.252359] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2465.253398] __list_lru_init+0x403/0x7e0 [ 2465.254283] alloc_super+0x7f4/0x990 [ 2465.255083] sget+0x10b/0x500 [ 2465.255743] ? kill_litter_super+0xa0/0xa0 [ 2465.256639] ? devpts_remount+0x130/0x130 [ 2465.257517] mount_nodev+0x2e/0x120 [ 2465.258290] ? devpts_kill_sb+0x70/0x70 [ 2465.259126] legacy_get_tree+0x105/0x220 [ 2465.259982] ? ns_capable+0xd9/0x100 [ 2465.260772] vfs_get_tree+0x8e/0x2f0 [ 2465.261561] path_mount+0x13ba/0x20a0 [ 2465.262367] ? strncpy_from_user+0x9e/0x460 [ 2465.263270] ? finish_automount+0xa40/0xa40 [ 2465.264185] ? getname_flags.part.0+0x1dd/0x4f0 [ 2465.265181] __x64_sys_mount+0x27e/0x300 [ 2465.266058] ? path_mount+0x20a0/0x20a0 [ 2465.266902] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2465.267999] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2465.269088] do_syscall_64+0x33/0x40 [ 2465.269875] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2465.270952] RIP: 0033:0x7f9c93414b19 [ 2465.271734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2465.275644] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2465.277249] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2465.278768] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2465.280282] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2465.281783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2465.283301] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:25:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:25:24 executing program 1: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:25:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x12, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2465.380299] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.2'. 03:25:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x8}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:25:24 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x10482, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f00000001c0)={{0xec7, 0x401}, 0x100, './file1\x00'}) pread64(r1, &(0x7f0000000140)=""/66, 0x42, 0x9) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000100)={0x0, 0xff}) 03:25:24 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:25:24 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x29, 0x2, 0x2, 0x9, 0x20, @private1, @mcast1, 0x0, 0x700, 0x4, 0x77f0}}) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000100)={@loopback, r1}, 0x14) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2478.281193] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:25:45 executing program 6: request_key(&(0x7f0000000140)='id_resolver\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:25:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x13, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:25:45 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:25:45 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x5, 0x8}, 0x3}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:25:45 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:25:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0xf}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:25:45 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 84) 03:25:45 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) setsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000100)=0x80000000, 0xfffffdfa) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) lseek(r0, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0x2ced6622, @empty, 0x2}, 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r3, &(0x7f0000000240)={0x7}, 0x7) execveat(r0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2486.369116] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2486.381394] FAULT_INJECTION: forcing a failure. [ 2486.381394] name failslab, interval 1, probability 0, space 0, times 0 [ 2486.384006] CPU: 1 PID: 26936 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2486.385427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2486.388203] Call Trace: [ 2486.388855] dump_stack+0x107/0x163 [ 2486.389739] should_fail.cold+0x5/0xa [ 2486.390532] ? create_object.isra.0+0x3a/0xa20 [ 2486.391464] should_failslab+0x5/0x10 [ 2486.392235] kmem_cache_alloc+0x5b/0x350 [ 2486.393057] ? mark_held_locks+0x9e/0xe0 [ 2486.393883] create_object.isra.0+0x3a/0xa20 [ 2486.394790] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2486.395832] kmem_cache_alloc_trace+0x151/0x360 [ 2486.396785] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2486.397782] __list_lru_init+0x403/0x7e0 [ 2486.398624] alloc_super+0x7f4/0x990 [ 2486.399387] sget+0x10b/0x500 [ 2486.400027] ? kill_litter_super+0xa0/0xa0 [ 2486.400889] ? devpts_remount+0x130/0x130 [ 2486.401734] mount_nodev+0x2e/0x120 [ 2486.402481] ? devpts_kill_sb+0x70/0x70 [ 2486.403287] legacy_get_tree+0x105/0x220 [ 2486.404103] ? ns_capable+0xd9/0x100 [ 2486.404853] vfs_get_tree+0x8e/0x2f0 [ 2486.405609] path_mount+0x13ba/0x20a0 [ 2486.406398] ? strncpy_from_user+0x9e/0x460 [ 2486.407267] ? finish_automount+0xa40/0xa40 [ 2486.408140] ? getname_flags.part.0+0x1dd/0x4f0 [ 2486.409093] __x64_sys_mount+0x27e/0x300 [ 2486.409928] ? path_mount+0x20a0/0x20a0 [ 2486.410747] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2486.411800] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2486.412841] do_syscall_64+0x33/0x40 [ 2486.413588] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2486.414640] RIP: 0033:0x7f9c93414b19 [ 2486.415389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2486.419096] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2486.420624] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2486.422058] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2486.423503] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2486.424921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2486.426361] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:25:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x8f}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:25:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x14, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:25:45 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 85) 03:25:45 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:25:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0xf0}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:25:45 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x10, 0x0, 0x7}, 0xc02}}, 0x18) clone3(&(0x7f0000000180)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:25:45 executing program 7: prctl$PR_GET_KEEPCAPS(0x7) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2486.608246] netlink: 216 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2486.655996] FAULT_INJECTION: forcing a failure. [ 2486.655996] name failslab, interval 1, probability 0, space 0, times 0 [ 2486.658584] CPU: 1 PID: 27361 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2486.660046] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2486.662425] Call Trace: [ 2486.663001] dump_stack+0x107/0x163 [ 2486.663774] should_fail.cold+0x5/0xa [ 2486.664594] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2486.665648] should_failslab+0x5/0x10 [ 2486.666450] kmem_cache_alloc_trace+0x55/0x360 [ 2486.667394] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2486.668440] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2486.669454] __list_lru_init+0x403/0x7e0 [ 2486.670329] alloc_super+0x7f4/0x990 [ 2486.671117] sget+0x10b/0x500 [ 2486.671769] ? kill_litter_super+0xa0/0xa0 [ 2486.672806] ? devpts_remount+0x130/0x130 [ 2486.673654] mount_nodev+0x2e/0x120 [ 2486.674555] ? devpts_kill_sb+0x70/0x70 [ 2486.675371] legacy_get_tree+0x105/0x220 [ 2486.676362] ? ns_capable+0xd9/0x100 [ 2486.677131] vfs_get_tree+0x8e/0x2f0 [ 2486.678041] path_mount+0x13ba/0x20a0 [ 2486.678855] ? strncpy_from_user+0x9e/0x460 [ 2486.679909] ? finish_automount+0xa40/0xa40 [ 2486.680810] ? getname_flags.part.0+0x1dd/0x4f0 [ 2486.681956] __x64_sys_mount+0x27e/0x300 [ 2486.682786] ? path_mount+0x20a0/0x20a0 [ 2486.683758] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2486.684807] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2486.686061] do_syscall_64+0x33/0x40 [ 2486.686846] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2486.688087] RIP: 0033:0x7f9c93414b19 [ 2486.688854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2486.693361] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2486.694977] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2486.696440] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2486.697915] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2486.699416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2486.701005] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:25:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x15, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:25:45 executing program 6: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x4, 0x2, 0x1, 0x594b, 0x3, 0x5, 0x1f, 0x47, 0x40, 0x167, 0x0, 0xffff, 0x38, 0x1, 0x1, 0x4, 0x800}, [{0x70000000, 0x800, 0x5a, 0xffff, 0x5, 0xffffffffffffff37, 0x2, 0x7fffffff}], "5d61f6fc82cbad766a8162e97a283f7b08cfa7af36b12746f8f2ef9e347ef0f869539cb72d621fecc998a8692ba74593e2be31329964873dc6a683917cb6843bf388f5057de24eaf28c23adc7a6da93c343e82ff75e88f30d4b1e1412b28211520e3edd35322008c0799716d54ccf18e8a", ['\x00', '\x00', '\x00', '\x00']}, 0x4e9) write$P9_RWSTAT(r2, &(0x7f0000000240)={0x7}, 0x7) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r3, &(0x7f0000000240)={0x7}, 0x7) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r4, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) fsetxattr$trusted_overlay_redirect(r4, &(0x7f00000002c0), &(0x7f0000000880)='./file1\x00', 0x8, 0x3) openat(r2, &(0x7f0000000200)='./file1\x00', 0x8102, 0x1a0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r5, 0x0, &(0x7f0000000300)='}\x00') add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r5) close(r1) clone3(&(0x7f0000000080)={0x13050300, 0x0, 0x0, 0x0, {0x10000040}, 0x0, 0x0, 0x0, 0x0, 0x61}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2486.739795] netlink: 216 bytes leftover after parsing attributes in process `syz-executor.2'. 03:25:45 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) clone3(&(0x7f0000000340)={0x108000400, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x10}, &(0x7f0000000180)=""/187, 0xbb, &(0x7f0000000240)=""/92, &(0x7f0000000300)=[r0, r0, r0, r1, r0], 0x5, {r2}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2499.909468] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:26:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7}, 0x7) symlinkat(&(0x7f0000000100)='./file1\x00', r1, &(0x7f0000000140)='./file1\x00') write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7}, 0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000240)={0x7}, 0x7) r3 = openat$cgroup_type(r1, &(0x7f0000000180), 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000001c0)={0x0, r3, 0x49, 0x9, 0x3, 0x6}) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x2a}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2508.691743] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2508.703613] FAULT_INJECTION: forcing a failure. 03:26:07 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:26:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x14c}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:26:07 executing program 6: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000940)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x2581, @private0={0xfc, 0x0, '\x00', 0x1}, 0xf7eb}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000140)="0c5b550dbc0d5adc04063b982f5bd4df47bd3f67f9e8b42873a3e8e71a2cc9213799e8c8f43a5d621d4b73a0b2d72c2b4bc4b25b35ad0d7e0ee8b46ba630f9fcf8d8952ba7", 0x45}, {&(0x7f0000000380)="7829855fb668e6606d5f03612be26e64702f2b0162aaf731886adc76eeb0d1d077c7044f27bb0c3944215b3542625c272c464d9d5f7e1d12a1f26c83d4168c09c2499cad9a2f6031ea9d9ff246c51397acedab114475c8b0a55a3006012417a2ee25f4e9ecde20aaafb49e97d46f9769bd7e55fe10137e1a70fe317bd201723b29a6c781142218497746f1f3e0bd4661f1554e52ac2596deb9641d8207a654888cc543223af111b21bee68fe5fb30f1efe674f84a152e2570d77474094efe6fc2c339f2d16171522b3", 0xc9}, {&(0x7f0000000480)="6ec9082f451100a65c47fda4c7df3823c5a71f333597e362ad2555a75ab28e753e7675d4f6601f38b423448785ec85cab49bbef8853f2146f3986b9cae08262df4aed12a6ec49de1229a6981b14da6fd50fedff08e25fe7f616460555a7c758a8a076e1196676b9a90d75e14eb75fea5ee6560b5b98e3a3d8240e0e01292876383106f87edcf8a65d9faa0a75013b4b0657e63c05d6e87c742fbe64a3e112e0b1160b1c3d0fbe65d83c101d879ff34fc3f610f4c21e09a43ab1835238da2459e2f97277b301e55fd8d83afc5c3e39af15e0ef7726592e3bd663be1166d23b235f801b171f3249d5425da50a82f5ba13a381d", 0xf2}, {&(0x7f0000000580)="dd1e2d96df244a82cdfaa4f6970952c6690fa6bc2f8783d1bf0728975d559dd423df0cdbedb88dc0f7e268332b084ede2d8270cd8b1670ef373667cc2136dc3bae97ba72f1b1310d137fb65c9d4f6944d1e3e8c826de78f80416e23a4e8ad630a95ccc3df77ab03ef1b4a0e504275393770d19ac2b8698ef424469c4e86a8c5d09081d72bd03a9d99ed13352fce46f9d6efae06e7c3cd8b8a8bd2ef875d9e8b0732f41cdc05b0d075474e093d4e2d3f08970ea723a2c6eb41a881dbbe330288ad44a0e188ffa46fad434765e9c883c926e7ef9c2c92ad616f9251ab4bba0e9c4cdcbef2cedb4996262d5e0b672a5a4", 0xef}], 0x4}}, {{&(0x7f0000000200)={0xa, 0x4e22, 0x4, @remote}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000240)}, {&(0x7f0000000680)="75a9cf87fd8f44db2f4015fa9448b449cda669d233f88dea24c8d479fecac3b2e8e5ddbe47f323758b3172cb71f1de7aea0f87b395142150bc61df3d325e5835951adc4035448a33390c5548bfa9545413a643997b9de3fff900dd49926160f784ab437dd0e7304fb9143b9c41907715794805385dea76d9bb3e01d2e04a7db783e039bc60ec7c42bd41b74489965f6885cf10f46aafbfb4ed78d918ebe1ded5b1ddc9a048ac4d5452dc36410c5aad52c5de73c471f9ee08d24ed28f86ea29a413242af5c790f66fdbe576a4e6bbf97923dcbe5142caccac003aa2aa3c689d5da92a24428db94e32a5eacd9405ad17133b5f19", 0xf3}], 0x2}}, {{&(0x7f0000000300)={0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, '\x00', 0x35}, 0x40}, 0x1c, &(0x7f0000000840)=[{&(0x7f0000000780)="de29888748763987368e527865cde403514e8b78a7789a3ce164b411f6dd5023d9d7e0dbc612883995a31372ecc0f9a7b9b2767597b2876c8e00926db25aed2f1263b7ca19319fca8ca4f84aaaaf9560e5ac89bc2887611a5168888ee101e152f3c63c2ba6ccc85c3972e048a45054168a6de6a7465572c21780e484a41616f70f8436b4aef2e8529c1516c4221e7a383c92a77c14565111eff7c01000679fd0f2091a924956e680", 0xa8}], 0x1, &(0x7f0000000a00)=[@hopopts={{0xa0, 0x29, 0x36, {0x2f, 0x10, '\x00', [@generic={0x74, 0x69, "fb8fb652d19914e299e9207d848d2dcc1fc12eefb1c5ac1b7c767a63e526cc551f040cf301e88f006545da9b5a22f8a61042ec238b83d2492050872d4420bc662044335e49e68b5d20457b1ad2340727cf5ff5ae175c234a50724c4f815ca8073305b6a8d11d3db765"}, @jumbo={0xc2, 0x4, 0x8001}, @hao={0xc9, 0x10, @local}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x5d7e}}], 0xb8}}], 0x3, 0x44010) request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_timeval(r2, 0x1, 0x29, &(0x7f0000001500), 0x10) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:26:07 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, r2, 0xd8499488957a772f}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r2, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_TX_POWER={0x8, 0xb, 0x4c8e}, @NL802154_ATTR_TX_POWER={0x8, 0xb, 0x4}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x34}, 0x1, 0x0, 0x0, 0x60008801}, 0x800) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:26:07 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 86) 03:26:07 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) ptrace(0x11, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/rt6_stats\x00') r1 = fork() ptrace(0x10, r1) ptrace(0x11, r1) syz_open_procfs(r1, &(0x7f00000001c0)='net/rt6_stats\x00') r2 = fork() r3 = fork() ptrace(0x10, r3) ptrace(0x11, r3) syz_open_procfs(r3, &(0x7f00000001c0)='net/rt6_stats\x00') r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r4, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) clone3(&(0x7f0000000380)={0x100880, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180), {}, &(0x7f00000001c0)=""/106, 0x6a, &(0x7f0000000240)=""/47, &(0x7f00000002c0)=[r0, r0, 0x0, 0x0, r1, r0, r2, r3, r0], 0x9, {r4}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:26:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x16, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2508.703613] name failslab, interval 1, probability 0, space 0, times 0 [ 2508.706975] CPU: 0 PID: 27796 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2508.708070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2508.709852] Call Trace: [ 2508.710278] dump_stack+0x107/0x163 [ 2508.710877] should_fail.cold+0x5/0xa [ 2508.711488] ? create_object.isra.0+0x3a/0xa20 [ 2508.712243] should_failslab+0x5/0x10 [ 2508.712859] kmem_cache_alloc+0x5b/0x350 [ 2508.713508] ? mark_held_locks+0x9e/0xe0 [ 2508.714196] create_object.isra.0+0x3a/0xa20 [ 2508.714908] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2508.715739] kmem_cache_alloc_trace+0x151/0x360 [ 2508.716483] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2508.717299] __list_lru_init+0x403/0x7e0 [ 2508.717962] alloc_super+0x7f4/0x990 [ 2508.718596] sget+0x10b/0x500 [ 2508.719099] ? kill_litter_super+0xa0/0xa0 [ 2508.719783] ? devpts_remount+0x130/0x130 [ 2508.720447] mount_nodev+0x2e/0x120 [ 2508.721048] ? devpts_kill_sb+0x70/0x70 [ 2508.721687] legacy_get_tree+0x105/0x220 [ 2508.722355] ? ns_capable+0xd9/0x100 [ 2508.722971] vfs_get_tree+0x8e/0x2f0 [ 2508.723596] path_mount+0x13ba/0x20a0 [ 2508.724205] ? strncpy_from_user+0x9e/0x460 [ 2508.724923] ? finish_automount+0xa40/0xa40 [ 2508.725614] ? getname_flags.part.0+0x1dd/0x4f0 [ 2508.726433] __x64_sys_mount+0x27e/0x300 [ 2508.727135] ? path_mount+0x20a0/0x20a0 [ 2508.727801] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2508.728665] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2508.729518] do_syscall_64+0x33/0x40 [ 2508.730130] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2508.730990] RIP: 0033:0x7f9c93414b19 [ 2508.731618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2508.734644] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2508.735871] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2508.737056] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2508.738233] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2508.739415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2508.740611] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:26:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:26:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0xf00}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:26:07 executing program 1: add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:26:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x18, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:26:07 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x800) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0xd0000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e24, @empty}}, 0x0, 0x0, 0x4c, 0x0, "b997544280fcdcd494d1b409b3eaa0c6c6f11d993c703dede60206b2a1ef0edcd175599b24553f889bc02d16a4a26f6f99ae2a6c6cec459b1403dac9913e3a0a669e15da57b28b59466edec01cbb939f"}, 0xd8) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000540)='5', 0x1, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000000100)='syz', &(0x7f00000002c0)) socket$inet6_tcp(0xa, 0x1, 0x0) [ 2508.934863] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 03:26:07 executing program 0: clone3(&(0x7f0000000080)={0x263873b80, 0x0, 0x0, 0x0, {0x20433}, 0x0, 0x0, 0x0, 0x0}, 0x58) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000040)={0x1f, @none}, 0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x10}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:26:07 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x400040, 0x27) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2521.305579] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:26:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x4c01}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:26:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x19, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:26:29 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = fork() ptrace(0x10, r1) ptrace$setregset(0x4205, r1, 0x2, &(0x7f0000000040)={0x0}) clone3(&(0x7f0000000300)={0x180102400, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x2b}, &(0x7f0000000180)=""/53, 0x35, &(0x7f00000001c0)=""/213, &(0x7f00000002c0)=[r0, r0, r1], 0x3}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000) 03:26:29 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) add_key(&(0x7f0000000240)='.dead\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="19579faec833d3af82cb32fc20635b8789e121bbe57aee9383b4ccf3b4768ae18642eebada6a8c84f927f43063", 0x2d, r0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) fcntl$setlease(r2, 0x400, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x74, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x6, 0x69}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x800000c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x2e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x1a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3d}]}, 0x74}, 0x1, 0x0, 0x0, 0x40000}, 0x4040015) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2530.157079] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 03:26:29 executing program 1: add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:26:29 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 87) [ 2530.211939] FAULT_INJECTION: forcing a failure. [ 2530.211939] name failslab, interval 1, probability 0, space 0, times 0 [ 2530.214383] CPU: 1 PID: 28549 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2530.215872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2530.218287] Call Trace: [ 2530.218874] dump_stack+0x107/0x163 [ 2530.219663] should_fail.cold+0x5/0xa [ 2530.220468] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2530.221541] should_failslab+0x5/0x10 [ 2530.222359] kmem_cache_alloc_trace+0x55/0x360 [ 2530.223344] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2530.224429] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2530.225467] __list_lru_init+0x403/0x7e0 [ 2530.226348] alloc_super+0x7f4/0x990 [ 2530.227159] sget+0x10b/0x500 [ 2530.227822] ? kill_litter_super+0xa0/0xa0 [ 2530.228717] ? devpts_remount+0x130/0x130 [ 2530.229595] mount_nodev+0x2e/0x120 [ 2530.230376] ? devpts_kill_sb+0x70/0x70 [ 2530.231297] legacy_get_tree+0x105/0x220 [ 2530.232168] ? ns_capable+0xd9/0x100 [ 2530.232946] vfs_get_tree+0x8e/0x2f0 [ 2530.233739] path_mount+0x13ba/0x20a0 [ 2530.234565] ? strncpy_from_user+0x9e/0x460 [ 2530.235503] ? finish_automount+0xa40/0xa40 [ 2530.236425] ? getname_flags.part.0+0x1dd/0x4f0 [ 2530.237434] __x64_sys_mount+0x27e/0x300 [ 2530.238315] ? path_mount+0x20a0/0x20a0 [ 2530.239196] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2530.240304] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2530.241425] do_syscall_64+0x33/0x40 [ 2530.242375] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2530.243737] RIP: 0033:0x7f9c93414b19 [ 2530.244722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2530.249303] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2530.250983] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2530.252518] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2530.254027] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2530.255562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2530.257085] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:26:29 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000180)={0x2040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0, 0x64, {r0}}, 0xfffffd7e) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:26:29 executing program 1: add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:26:29 executing program 6: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580)='\x00') r3 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x0}, 0x0, 0x0, r2) request_key(&(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)='logon\x00', r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r4) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @auto=[0x65, 0x39, 0x62, 0x61, 0x33, 0x64, 0x0, 0x30, 0x63, 0x36, 0x65, 0x38, 0x64, 0x61, 0x37, 0x39]}, &(0x7f00000002c0)={0x0, "9148061bccb394cca95a31da300dd8121875c74653bdd8a2a94e80e98600b0b237b7b2f6560243f4572623f044d1c828047690049f0acd5ca4baeb1358eeebee", 0x10}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r5, r2, r1, 0x0) 03:26:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x8f00}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:26:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x1a, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:26:29 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:26:29 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_send_signal(0xffffffffffffffff, 0x2a, &(0x7f0000000100)={0xf, 0x40, 0x522}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2530.421695] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. 03:26:29 executing program 1: r0 = request_key(0x0, &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:26:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0xf000}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2543.695467] kmemleak: 50 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:26:50 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x20001, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:26:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x1b, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:26:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0xffff}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:26:50 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) fallocate(r1, 0x8, 0x6, 0x2) close(0xffffffffffffffff) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000180)='syz', r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:26:50 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 88) 03:26:50 executing program 6: request_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:26:50 executing program 1: r0 = request_key(0x0, &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:26:50 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0xb}, 0xc00}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2551.887205] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2551.899597] FAULT_INJECTION: forcing a failure. [ 2551.899597] name failslab, interval 1, probability 0, space 0, times 0 [ 2551.901912] CPU: 1 PID: 29176 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2551.903332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2551.905606] Call Trace: [ 2551.906144] dump_stack+0x107/0x163 [ 2551.906880] should_fail.cold+0x5/0xa [ 2551.907651] ? create_object.isra.0+0x3a/0xa20 [ 2551.908571] should_failslab+0x5/0x10 [ 2551.909334] kmem_cache_alloc+0x5b/0x350 [ 2551.910151] ? mark_held_locks+0x9e/0xe0 [ 2551.910969] create_object.isra.0+0x3a/0xa20 [ 2551.911869] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2551.912892] kmem_cache_alloc_trace+0x151/0x360 [ 2551.913836] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2551.914824] __list_lru_init+0x403/0x7e0 [ 2551.915657] alloc_super+0x7f4/0x990 [ 2551.916416] sget+0x10b/0x500 [ 2551.917046] ? kill_litter_super+0xa0/0xa0 [ 2551.917894] ? devpts_remount+0x130/0x130 [ 2551.918729] mount_nodev+0x2e/0x120 [ 2551.919467] ? devpts_kill_sb+0x70/0x70 [ 2551.920266] legacy_get_tree+0x105/0x220 [ 2551.921088] ? ns_capable+0xd9/0x100 [ 2551.921837] vfs_get_tree+0x8e/0x2f0 [ 2551.922587] path_mount+0x13ba/0x20a0 [ 2551.923372] ? strncpy_from_user+0x9e/0x460 [ 2551.924236] ? finish_automount+0xa40/0xa40 [ 2551.925102] ? getname_flags.part.0+0x1dd/0x4f0 [ 2551.926063] __x64_sys_mount+0x27e/0x300 [ 2551.926878] ? path_mount+0x20a0/0x20a0 [ 2551.927687] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2551.928738] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2551.929775] do_syscall_64+0x33/0x40 [ 2551.930523] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2551.931556] RIP: 0033:0x7f9c93414b19 [ 2551.932302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2551.935992] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2551.937509] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2551.938935] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2551.940368] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2551.941792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2551.943229] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:26:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:26:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x1c, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:26:50 executing program 1: r0 = request_key(0x0, &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:26:50 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000280)={0x15, 0x7, 0x2, {{0x8, '#/%,\\&^-'}, 0xffff}}, 0x15) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7ff}}, './file1\x00'}) write$P9_RVERSION(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="150000ef65ffff0200000008003950ba03cd812e4c"], 0x15) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x900, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file1\x00') write$P9_RFSYNC(r0, &(0x7f00000001c0)={0x7, 0x33, 0x1}, 0x7) 03:26:50 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 89) 03:26:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c19c2, 0x103) write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7}, 0x7) r1 = openat$cgroup_ro(r0, &(0x7f0000000700)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000740)=ANY=[@ANYBLOB="01000000010054304b8fdb6f", @ANYRES32=r2, @ANYBLOB="00040000000000002e2f66696c653100"]) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000040)={0x3, 0x4}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000780), 0x180, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000007c0)=[r3, r1], 0x2) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x20000000}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0xfffffffffffffdf6) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f0000000480), &(0x7f0000000140)='./file1\x00', 0x80, 0x6, &(0x7f0000000600)=[{&(0x7f0000000940)="c95ece6ff29a35cb350eb6213edc491742c0b2163e5ab1fdb1d2ab878a609484d51eb6f19756cc7b531d925c4e423a9afbc129d396f9d27f8e79b8b7e64d8c5fce18433ca27d6966fc1d1052a887ac17267bec6d60befd35b9b9a98ce512cbffbf65be261460678403622ace09fd551617ae3abe1bcf3c6377f55a18ae53738f3ca14ec01ced34ad17011d18697ecafb919796d19aef187d1014110921f16206a8b7f8554dc7eb05f4e22bfaaf48ec12f687a0a3ea65466dfc7945e19dd01f7beab2bad5c3d7e620a7e92e4bdfe05e1878cb244df6ba69d99c532994e095236c8605da645087e130a512afd24a85a24b54fa0b35b0", 0xf5, 0x6}, {&(0x7f0000000180)="8aff0e28f99e", 0x6, 0x1}, {&(0x7f0000000380)="c31264496e772c5b136cc1348c1a75a000f346525a4f71634416b2b90a2e34cd5b81d2d6efa79b309dd69be37d70c03e7021e9bc1278c71bd4bc7c21413a78e4925dd5fd38563fd0f115849975111f5aec7e55028bab85211c4b4e361ec7f8fc5b5601760efd3ef632f9a1ff215251691ce8b6a3359d67c5b0cc90313c5b23fd6b79d466317223d9dc9b4271683bd267a6befddb669a76c087306d4440fe3aa683327106e9402b10f958ca3933f82002e4b76bc4af5c45894b85914a9963563daa6d4d162fbe56969e719cc6a7a06ec84c4e0b4265c4292689a968401599067641751c21fb271f86225627a470691ba250d12f59c5081e53", 0xf8, 0x100}, {&(0x7f00000001c0)="d8bf666559cbbf18e4c46b45e158827b3676d0b234b88abaa3fd65f12eb6a60f726ff926065b53288b9dde9c2b6604fda8a8a3bab1ca000c9e12e8a30b44a527ee1f6198", 0x44, 0x6a8b}, {&(0x7f0000000800)="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", 0x133, 0x3}, {&(0x7f0000000500)="f8e45f8d8afb55b770e565b8890c6155c0bc5b43585892a91b884b970d8301d0d67f77a3ef90755dfece4b807745d8ffa6f40b59c0cafb96480526768f86e0447e79eda79b52658842b0c616562fcaac84af0799b8cecaca09d0a352051c938c602d8cdb25bfccd079b4cff22e450505c50b424e0e36db38afa52e791e70c0a7f432c17e2a242fee3c9378d12d39188a330a6094943944e1462258601781bd06335c86ec93d71de9d44c79bad109a6c4713348070e698bdb1690e5354871a5eb6de46aa5a4c37ca17cf98b20987732603252a1b2b4d1fa2a246ecefaf2300d9edc3cfc2cb0f33b71134b5186268110df328a701f8e7ef321186be4", 0xfb, 0x4}], 0x24404, &(0x7f00000006c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x2d]}}, {@size={'size', 0x3d, [0x6d]}}, {@huge_never}], [{@hash}, {@smackfshat={'smackfshat', 0x3d, '%*[[%!\\'}}]}) ioctl$AUTOFS_IOC_EXPIRE(r4, 0x810c9365, &(0x7f0000000a40)={{0x7, 0x1f}, 0x100, './file1\x00'}) [ 2552.110481] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:26:50 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="798b5d46d90772ad85a1b4b9d7f7ea3af68c", 0x12, 0xfffffffffffffffb) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00080000ff000400002e2f668971a3eccba77e75f9a10b69c252696c6531"]) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x2, 0x0, "e9d0f9ae9911c0e2d960a6400a1d6441ca6d1e1847954d1a90115061ce5528dd72fa8db2aebc586509f5a0f46307a2d122317ef80b1ec154a20c656282591d3237ab40d72643893165ae8d2584291e4c"}, 0xd8) close(0xffffffffffffffff) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) fallocate(r2, 0x43, 0x3, 0x7fffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$F2FS_IOC_DEFRAGMENT(r2, 0xc010f508, &(0x7f0000000380)={0x100, 0x3}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100) 03:26:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:26:51 executing program 6: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) recvmmsg$unix(r1, &(0x7f00000010c0)=[{{&(0x7f0000000140), 0x6e, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/131, 0x83}, {&(0x7f0000000380)=""/203, 0xcb}, {&(0x7f0000000480)=""/218, 0xda}, {&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/165, 0xa5}, {&(0x7f0000000040)=""/60, 0x3c}, {&(0x7f0000000740)=""/202, 0xca}], 0x7, &(0x7f0000000840)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}, {{&(0x7f0000000940), 0x6e, &(0x7f0000000ac0)=[{&(0x7f00000009c0)=""/196, 0xc4}], 0x1, &(0x7f0000000b00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000000b80), 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000c00)=""/220, 0xdc}, {&(0x7f0000000d00)=""/243, 0xf3}, {&(0x7f0000000e00)=""/127, 0x7f}, {&(0x7f0000000e80)=""/46, 0x2e}, {&(0x7f0000000ec0)=""/151, 0x97}, {&(0x7f0000000f80)=""/9, 0x9}], 0x6, &(0x7f0000001040)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x50}}], 0x3, 0x10000, &(0x7f0000001180)) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:26:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x1d, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2552.192744] FAULT_INJECTION: forcing a failure. [ 2552.192744] name failslab, interval 1, probability 0, space 0, times 0 [ 2552.195159] CPU: 1 PID: 29606 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2552.196724] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2552.199251] Call Trace: [ 2552.199798] dump_stack+0x107/0x163 [ 2552.200545] should_fail.cold+0x5/0xa [ 2552.201328] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2552.202367] should_failslab+0x5/0x10 [ 2552.203157] kmem_cache_alloc_trace+0x55/0x360 [ 2552.204086] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2552.205118] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2552.206127] __list_lru_init+0x403/0x7e0 [ 2552.206969] alloc_super+0x7f4/0x990 [ 2552.207753] sget+0x10b/0x500 [ 2552.208395] ? kill_litter_super+0xa0/0xa0 [ 2552.209249] ? devpts_remount+0x130/0x130 [ 2552.210094] mount_nodev+0x2e/0x120 [ 2552.210830] ? devpts_kill_sb+0x70/0x70 [ 2552.211646] legacy_get_tree+0x105/0x220 [ 2552.212475] ? ns_capable+0xd9/0x100 [ 2552.213230] vfs_get_tree+0x8e/0x2f0 [ 2552.213990] path_mount+0x13ba/0x20a0 [ 2552.214768] ? strncpy_from_user+0x9e/0x460 [ 2552.215669] ? finish_automount+0xa40/0xa40 [ 2552.216546] ? getname_flags.part.0+0x1dd/0x4f0 [ 2552.217505] __x64_sys_mount+0x27e/0x300 [ 2552.218327] ? path_mount+0x20a0/0x20a0 [ 2552.219145] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2552.220206] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2552.221255] do_syscall_64+0x33/0x40 [ 2552.222011] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2552.223064] RIP: 0033:0x7f9c93414b19 [ 2552.223821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2552.227573] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2552.229115] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2552.230561] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2552.232018] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2552.233465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2552.234916] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:26:51 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) [ 2552.258814] netlink: 280 bytes leftover after parsing attributes in process `syz-executor.2'. 03:26:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0x8}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:26:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x1e, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2552.425276] netlink: 232 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2564.315493] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:27:12 executing program 7: sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x2, 0x3, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x18}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFQA_CFG_CMD={0x8, 0x1, {0x2, 0x0, 0x25}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000040}, 0x8000) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:27:12 executing program 6: request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:27:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x21, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:27:12 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000540)='5', 0x1, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='syzkaller\x00', &(0x7f0000000200)=@chain={'key_or_keyring:', r0}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000180)={0x21100200, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:27:12 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:27:12 executing program 0: execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file1\x00', 0x13) r1 = socket$inet(0x2, 0x0, 0x2) fstat(r1, &(0x7f0000000080)) fcntl$dupfd(r1, 0x406, r0) 03:27:12 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 90) 03:27:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0xf}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2573.768529] netlink: 216 bytes leftover after parsing attributes in process `syz-executor.2'. 03:27:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x22, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2573.808823] FAULT_INJECTION: forcing a failure. [ 2573.808823] name failslab, interval 1, probability 0, space 0, times 0 [ 2573.811242] CPU: 0 PID: 30044 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2573.812689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2573.815040] Call Trace: [ 2573.815609] dump_stack+0x107/0x163 [ 2573.816376] should_fail.cold+0x5/0xa [ 2573.817177] ? create_object.isra.0+0x3a/0xa20 [ 2573.818133] should_failslab+0x5/0x10 [ 2573.818930] kmem_cache_alloc+0x5b/0x350 [ 2573.819807] ? mark_held_locks+0x9e/0xe0 [ 2573.820661] create_object.isra.0+0x3a/0xa20 [ 2573.821572] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2573.822636] kmem_cache_alloc_trace+0x151/0x360 [ 2573.823623] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2573.824652] __list_lru_init+0x403/0x7e0 [ 2573.825514] alloc_super+0x7f4/0x990 [ 2573.826304] sget+0x10b/0x500 [ 2573.826958] ? kill_litter_super+0xa0/0xa0 [ 2573.828118] ? devpts_remount+0x130/0x130 [ 2573.829151] mount_nodev+0x2e/0x120 [ 2573.830045] ? devpts_kill_sb+0x70/0x70 [ 2573.831013] legacy_get_tree+0x105/0x220 [ 2573.832042] ? ns_capable+0xd9/0x100 [ 2573.832959] vfs_get_tree+0x8e/0x2f0 [ 2573.833876] path_mount+0x13ba/0x20a0 [ 2573.834820] ? strncpy_from_user+0x9e/0x460 [ 2573.835882] ? finish_automount+0xa40/0xa40 [ 2573.836933] ? getname_flags.part.0+0x1dd/0x4f0 [ 2573.838099] __x64_sys_mount+0x27e/0x300 [ 2573.839089] ? path_mount+0x20a0/0x20a0 [ 2573.840077] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2573.841362] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2573.842623] do_syscall_64+0x33/0x40 [ 2573.843552] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2573.844682] RIP: 0033:0x7f9c93414b19 [ 2573.845454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2573.849219] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2573.850790] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2573.852266] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2573.853727] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2573.855185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2573.856664] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 03:27:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0x8f}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2573.913702] netlink: 280 bytes leftover after parsing attributes in process `syz-executor.2'. 03:27:12 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:27:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x23, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2574.038688] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:27:12 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:27:12 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0xffffffc6, 0x71, 0x1, {{0x40, 0x3, 0x20000000000000}, 0xc02}}, 0xfd0c649b3236a439) fallocate(r0, 0x21, 0x1, 0x101) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), &(0x7f0000000100)=0x4) 03:27:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0xf0}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:27:12 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.kill\x00', 0x0, 0x0) openat(r1, &(0x7f0000000180)='./file1\x00', 0x1, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:27:12 executing program 6: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='syz', r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r1) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000040)={0x50000000}) 03:27:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x24, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:27:12 executing program 0: clone3(&(0x7f0000000080)={0x33150180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2574.198742] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2587.196835] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 03:27:42 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 91) 03:27:42 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:27:42 executing program 6: write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000240)={0x7, 0x15, 0x2}, 0x7) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x2182c3, 0x0) close(r0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x40000, &(0x7f0000000380)={'trans=unix,', {[{@cache_loose}, {@uname={'uname', 0x3d, '}(!'}}, {@version_L}], [{@euid_lt={'euid<', r1}}, {@smackfshat={'smackfshat', 0x3d, '&:^+}'}}, {@appraise_type}, {@smackfsfloor={'smackfsfloor', 0x3d, '-'}}, {@obj_role={'obj_role', 0x3d, 'syz'}}]}}) 03:27:42 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000180)={0xb000380, 0x0, 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:27:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x25, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:27:42 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x8, 0x1, 0x80000}}}, 0x18) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:27:42 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) execveat(r0, &(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=[&(0x7f00000002c0)='[[\x00', &(0x7f0000000300)='&\x00'], &(0x7f0000000400)=[&(0x7f0000000380)='&\x00', &(0x7f00000003c0)='&\x00'], 0x1000) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) execveat(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)=[&(0x7f0000000100)='\x00'], &(0x7f0000000240)=[&(0x7f0000000180)='&\x00', &(0x7f00000001c0)='&(]:++!\x00', &(0x7f0000000200)='[[\x00'], 0x400) 03:27:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0x14c}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) [ 2603.966282] FAULT_INJECTION: forcing a failure. [ 2603.966282] name failslab, interval 1, probability 0, space 0, times 0 [ 2603.968716] CPU: 0 PID: 30698 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2603.970137] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2603.972474] Call Trace: [ 2603.973027] dump_stack+0x107/0x163 [ 2603.973790] should_fail.cold+0x5/0xa [ 2603.974583] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2603.975634] should_failslab+0x5/0x10 [ 2603.976432] kmem_cache_alloc_trace+0x55/0x360 [ 2603.977376] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2603.978434] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2603.979458] __list_lru_init+0x403/0x7e0 [ 2603.980341] alloc_super+0x7f4/0x990 [ 2603.981133] sget+0x10b/0x500 [ 2603.981786] ? kill_litter_super+0xa0/0xa0 [ 2603.982659] ? devpts_remount+0x130/0x130 [ 2603.983539] mount_nodev+0x2e/0x120 [ 2603.984309] ? devpts_kill_sb+0x70/0x70 [ 2603.985135] legacy_get_tree+0x105/0x220 [ 2603.985976] ? ns_capable+0xd9/0x100 [ 2603.986758] vfs_get_tree+0x8e/0x2f0 [ 2603.987541] path_mount+0x13ba/0x20a0 [ 2603.988361] ? strncpy_from_user+0x9e/0x460 [ 2603.989254] ? finish_automount+0xa40/0xa40 [ 2603.990148] ? getname_flags.part.0+0x1dd/0x4f0 [ 2603.991136] __x64_sys_mount+0x27e/0x300 [ 2603.992009] ? path_mount+0x20a0/0x20a0 [ 2603.992845] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2603.993940] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2603.995023] do_syscall_64+0x33/0x40 [ 2603.995858] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2603.996928] RIP: 0033:0x7f9c93414b19 [ 2603.997707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2604.001542] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2604.003126] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2604.004609] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2604.006082] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2604.007557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2604.009052] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 [ 2604.014316] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 03:27:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0xf00}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:27:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x26, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) 03:27:42 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) [ 2604.142232] netlink: 280 bytes leftover after parsing attributes in process `syz-executor.2'. 03:27:43 executing program 3: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) request_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000180)='syz', r0) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:27:43 executing program 0: clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x10) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000004c0), 0x5, 0x2203) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000000, 0x80010, r1, 0x8000000) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x1010, r3, 0x10000000) syz_io_uring_submit(r2, r4, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x5, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0xc000}}, 0xd1f4) execveat(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00'], &(0x7f0000000480)=[&(0x7f00000002c0)='*\x00', &(0x7f0000000300)=':#\'\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)=':~', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00'], 0x800) r5 = pkey_alloc(0x0, 0xcc79f10b2a179879) pkey_mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000009, r5) close_range(r0, 0xffffffffffffffff, 0x2) 03:27:56 executing program 6: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r1) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x20200, 0x0) execveat(r2, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000300)=[&(0x7f0000000200)='}\xd5#@-/\'\x00', &(0x7f0000000240)='\x00', &(0x7f00000002c0)='keyring\x00'], &(0x7f0000000400)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='rxrpc_s\x00'], 0x1000) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, r3) 03:27:56 executing program 0: r0 = clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100), 0x6e, &(0x7f0000000300)=[{&(0x7f0000000180)=""/122, 0x7a}, {&(0x7f0000000040)=""/52, 0x34}, {&(0x7f0000000200)=""/232, 0xe8}], 0x3, &(0x7f0000000340)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}, 0x21) r2 = getpgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002980)={0x0, 0x0}, &(0x7f00000029c0)=0xc) getgroups(0x2, &(0x7f0000002a00)=[0xffffffffffffffff, 0xee00]) r5 = geteuid() r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r7, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r7, r6, 0x0, 0x9bbb) r8 = socket$unix(0x1, 0x1, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) write$P9_RWSTAT(r9, &(0x7f0000000240)={0x7}, 0x7) sendfile(r8, r9, 0x0, 0x6) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a80)={0x4, &(0x7f0000002a40)=[{0xa291, 0x3f, 0x4, 0x4}, {0x200, 0x2, 0x4, 0x9}, {0x401, 0x4, 0x7f, 0x300000}, {0x4, 0xd1, 0x2d, 0x8}]}) sendmsg$unix(r1, &(0x7f0000002b40)={&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000028c0)=[{&(0x7f0000000480)="2fbeb4cf31c778c9ad68670acb3ba5345735130799bcceaadcaff44980b56b7ce93c7e87f14f77a6bbe82da9953b6c3c34dc58c6823013234ae50f7dd6c2e7b855cb087613a0e717b0b07802f083b5c4a9742b196a", 0x55}, {&(0x7f0000000500)="590eef0e0deed49c6de6a206ef2fc1618f7168641658d32a3175764133544205dfa8010165b82662276aa13a605c06ff6d8321f65ac0f0891e5b3e22d6da28d2d09edd627121d39b24a284853909fa10ce28b0cbfc3734dbed98c226a7f86c6b2f5205ee179a0ddbddc9c392fbbf60b66a7e4e975cb7ec2b31c3132c2ce43fc974af0a753965be96a6e73a20a08fba832828b96299434407db885ee547c30b1a0a65592bbe4c897e5eaab764fe21bf05e2f719ce051376d6373c302021cc1d1ab910133c29b0c49ac9c23a1417303b5a9e58919582ea6c3d408a6910d8aca03f1a9e39fdef2eb329aab5f1368dfab8", 0xef}, {&(0x7f0000000600)="e17784e289931761713a762d530fe1a8c3e175f566c2d5b49e244bdb08aed8d2ed93caa7e7949e3fd8ccde0e785375eefdea0c61d86a1fe4c24c6931b18523e6b7440dea1f75b7d3467b6568a3f209961fe64675e7a6775a0dbf6e855aa6d5d454eb66112aae9500", 0x68}, {&(0x7f0000000680)="06b867491ad59929ca978fa8eb3567f72cf5a72d582ab0d21c2f872c4963defa22423dfd5260b31ddea5a74a452186a0df4e004c70623ea1a2afa7f502509db328238d9e63868eec34a3ecf3d5cff491b763c877cc3431", 0x57}, {&(0x7f0000000700)="8ef9f3d7647e5d4b10311881c1f272924492d2d99b852999d9e5d4fe7f3bf17200b454", 0x23}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="16c56ccee59f8fced7b9e7407eb7419efffd748a220ead024b9426f8b6233d116c8a30968760bf0c194e", 0x2a}, {&(0x7f0000001780)="b3a68d152f3c8c1cf4b30cd7c1f52bce92b9af395c2af3a8b814d46584b43853f20f3893f698bb56c89aef0b22a442f2e2122f305c6655a54d50f7943060cd92d07e63ecb793c8d41df2372941a6517cfd9d7a3bc5ca015fffd5f3302ee67495d9b90743985c9953eb9d10df50839c1728c6eef93822b50dba6907093cad9835ac4bbff6bad9f1440c37d5f7961fe9434cc3e65378f7a08baaa1ecdf3427e51137f614d775f69e5fb6bee383b7a524bd8387ebb77b967e8c492dc7bf1431c6064b0f6d4fb7fb9647f3064a6550c0c90e10565071ec21cd811b1fea71727d0d5a25", 0xe1}, {&(0x7f0000001880)="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", 0x1000}, {&(0x7f0000002880)="60bad5f56194e584d2f56b3f8df3cb0ae5e877598e380405c5083298c3c0d935b283926c06b6a3afe97b6f255e3c80e9cfe22d10df78", 0x36}], 0xa, &(0x7f0000002ac0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r0, r5, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r7, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70, 0x4000}, 0x40) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:27:56 executing program 7: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="010000a31300000000000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='./file1\x00']) r2 = openat(r1, 0x0, 0xc15043, 0x10a) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) r3 = fork() ptrace(0x10, r3) ptrace(0x11, r3) fork() syz_open_procfs(r3, &(0x7f00000001c0)='net/rt6_stats\x00') fcntl$setown(r2, 0x8, r3) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10a) write$P9_ROPEN(r4, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) close(r4) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x5}, 0xe) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 03:27:56 executing program 3: request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040), 0x4) close(0xffffffffffffffff) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x31}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = socket$inet_icmp(0x2, 0x2, 0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) 03:27:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x1d, 0x17, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0x4c01}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@tmpl={0x44, 0x5, [{{@in6=@dev}, 0x0, @in=@remote}]}]}, 0x16c}}, 0x0) 03:27:56 executing program 5: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa78) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) (fail_nth: 92) 03:27:56 executing program 1: r0 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4}, 0xc02}}, 0x18) close(0xffffffffffffffff) add_key$keyring(&(0x7f0000000500), &(0x7f0000001580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000001680)="350f106e162ea6d7012575da6944bb4786e5cafd36e8d282b7cc3b085fced05a1a1c02b790d271f1f37107eacd51506eb3670eaa06f780716452a820087ce90684f1038fdbf1660948f4abcbbfa6cb8116fb68b1bce3341bfceb4914b74456f0090c927cdbb3d8c999ae5025e11c4e0c4ded406bdc118d1a6e640832e67470a723c64cdf8520203fd48e735cc8cb7f52352600000000000000", 0xffffffffffffff88, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) clone3(&(0x7f0000000080)={0x3040300, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='-\x00', 0x0) 03:27:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=@acquire={0x128, 0x27, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@private1, {@in6=@private2}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0x128}}, 0x0) [ 2617.353429] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2617.355525] [ 2617.355879] ============================= [ 2617.356763] WARNING: suspicious RCU usage [ 2617.357642] 5.10.123 #1 Not tainted [ 2617.358416] ----------------------------- [ 2617.359276] net/xfrm/xfrm_user.c:1110 suspicious rcu_dereference_check() usage! [ 2617.360813] [ 2617.360813] other info that might help us debug this: [ 2617.360813] [ 2617.362479] [ 2617.362479] rcu_scheduler_active = 2, debug_locks = 1 [ 2617.363859] 1 lock held by syz-executor.2/31350: [ 2617.365017] #0: ffff88800d86c510 (&net->xfrm.xfrm_cfg_mutex){+.+.}-{3:3}, at: xfrm_netlink_rcv+0x5c/0x90 [ 2617.371058] [ 2617.371058] stack backtrace: [ 2617.372295] CPU: 0 PID: 31350 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2617.373717] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2617.376041] Call Trace: [ 2617.376587] dump_stack+0x107/0x163 [ 2617.377357] xfrm_set_default+0x642/0x740 [ 2617.377576] FAULT_INJECTION: forcing a failure. [ 2617.377576] name failslab, interval 1, probability 0, space 0, times 0 [ 2617.378205] ? xfrm_add_acquire+0xc20/0xc20 [ 2617.378219] xfrm_user_rcv_msg+0x412/0x830 [ 2617.378247] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2617.383279] ? __mutex_lock+0x425/0x1250 [ 2617.384123] ? lock_acquire+0x1b9/0x490 [ 2617.384949] netlink_rcv_skb+0x14b/0x430 [ 2617.385782] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2617.386806] ? netlink_ack+0xab0/0xab0 [ 2617.387615] ? netlink_deliver_tap+0x1c4/0xc40 [ 2617.388567] xfrm_netlink_rcv+0x6b/0x90 [ 2617.389385] netlink_unicast+0x53a/0x7e0 [ 2617.390219] ? netlink_attachskb+0x810/0x810 [ 2617.391141] netlink_sendmsg+0x901/0xdf0 [ 2617.391991] ? netlink_unicast+0x7e0/0x7e0 [ 2617.392878] ? netlink_unicast+0x7e0/0x7e0 [ 2617.393739] sock_sendmsg+0x150/0x190 [ 2617.394520] ____sys_sendmsg+0x709/0x870 [ 2617.395364] ? kernel_sendmsg+0x50/0x50 [ 2617.396184] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2617.397122] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2617.398225] ___sys_sendmsg+0xf3/0x170 [ 2617.399015] ? sendmsg_copy_msghdr+0x160/0x160 [ 2617.399965] ? lock_downgrade+0x6d0/0x6d0 [ 2617.400812] ? finish_task_switch+0x126/0x5d0 [ 2617.401718] ? lock_downgrade+0x6d0/0x6d0 [ 2617.402566] ? __fget_files+0x296/0x480 [ 2617.403382] ? __fget_light+0xea/0x280 [ 2617.404191] __sys_sendmsg+0xe5/0x1b0 [ 2617.404958] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2617.405838] ? io_schedule_timeout+0x140/0x140 [ 2617.406782] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2617.407847] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2617.408919] ? trace_hardirqs_on+0x5b/0x180 [ 2617.409804] do_syscall_64+0x33/0x40 [ 2617.410575] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2617.411620] RIP: 0033:0x7f55587a4b19 [ 2617.412393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2617.416161] RSP: 002b:00007f5555d1a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2617.417697] RAX: ffffffffffffffda RBX: 00007f55588b7f60 RCX: 00007f55587a4b19 [ 2617.419137] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2617.420592] RBP: 00007f55587fef6d R08: 0000000000000000 R09: 0000000000000000 [ 2617.422041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2617.423485] R13: 00007fff2e52aacf R14: 00007f5555d1a300 R15: 0000000000022000 [ 2617.424995] CPU: 1 PID: 31351 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2617.426420] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2617.428740] Call Trace: [ 2617.429277] dump_stack+0x107/0x163 [ 2617.430025] should_fail.cold+0x5/0xa [ 2617.430803] ? create_object.isra.0+0x3a/0xa20 [ 2617.431735] should_failslab+0x5/0x10 [ 2617.432527] kmem_cache_alloc+0x5b/0x350 [ 2617.433353] ? mark_held_locks+0x9e/0xe0 [ 2617.434186] create_object.isra.0+0x3a/0xa20 [ 2617.435085] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2617.436142] kmem_cache_alloc_trace+0x151/0x360 [ 2617.437100] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2617.438101] __list_lru_init+0x403/0x7e0 [ 2617.438934] alloc_super+0x7f4/0x990 [ 2617.439699] sget+0x10b/0x500 [ 2617.440345] ? kill_litter_super+0xa0/0xa0 [ 2617.441203] ? devpts_remount+0x130/0x130 [ 2617.442049] mount_nodev+0x2e/0x120 [ 2617.442791] ? devpts_kill_sb+0x70/0x70 [ 2617.443591] legacy_get_tree+0x105/0x220 [ 2617.444426] ? ns_capable+0xd9/0x100 [ 2617.445180] vfs_get_tree+0x8e/0x2f0 [ 2617.445931] path_mount+0x13ba/0x20a0 [ 2617.446715] ? strncpy_from_user+0x9e/0x460 [ 2617.447595] ? finish_automount+0xa40/0xa40 [ 2617.448476] ? getname_flags.part.0+0x1dd/0x4f0 [ 2617.449432] __x64_sys_mount+0x27e/0x300 [ 2617.450253] ? path_mount+0x20a0/0x20a0 [ 2617.451059] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2617.452139] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2617.453193] do_syscall_64+0x33/0x40 [ 2617.453949] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2617.454999] RIP: 0033:0x7f9c93414b19 [ 2617.455761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2617.459521] RSP: 002b:00007f9c9098a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2617.461084] RAX: ffffffffffffffda RBX: 00007f9c93527f60 RCX: 00007f9c93414b19 [ 2617.462536] RDX: 00000000200002c0 RSI: 0000000020000280 RDI: 0000000000000000 [ 2617.464000] RBP: 00007f9c9098a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2617.465451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2617.466900] R13: 00007ffca5e2140f R14: 00007f9c9098a300 R15: 0000000000022000 VM DIAGNOSIS: 03:27:56 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffff88804b307000 RCX=ffffc90000dee000 RDX=1ffffffff0851b40 RSI=ffffffff81fdd1a9 RDI=0000000000000007 RBP=ffffffff8428da00 RSP=ffff88804b306cd8 R8 =ffff88804b306ff0 R9 =ffffffff8689eda7 R10=000000007fffffff R11=0000000000000001 R12=ffff88804b307000 R13=ffffffff8428da00 R14=0000000000000010 R15=ffff88804b306dd8 RIP=ffffffff81fdd1be RFL=00000012 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f5555d1a700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00000000200004c0 CR3=0000000048f9c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f555888b7c0 00007f555888b7c8 YMM02=0000000000000000 0000000000000000 00007f555888b7e0 00007f555888b7c0 YMM03=0000000000000000 0000000000000000 00007f555888b7c8 00007f555888b7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=58af22ec7899d700 RBX=1ffff1100804df7f RCX=0000000000000000 RDX=dffffc0000000000 RSI=ffff88800ca25528 RDI=ffffffff84cfd7c0 RBP=ffff88804026fca0 RSP=ffff88804026fbb8 R8 =0000000000000001 R9 =0000000000000001 R10=fffffbfff0a8df29 R11=0000000000000001 R12=ffff88804026fc78 R13=ffff88800ca25528 R14=0000000000000000 R15=ffffffff84cfd7c0 RIP=ffffffff81257f06 RFL=00000286 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555557517400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d124000 CR3=0000000040b9c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000