0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:21 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:21 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:21 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0) stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r1) 12:14:21 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:14:35 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:14:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1371.478290] Process accounting resumed 12:14:35 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:35 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:14:48 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:48 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:48 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:48 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:48 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:48 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:48 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) [ 1384.566792] perf: interrupt took too long (2503 > 2500), lowering kernel.perf_event_max_sample_rate to 79000 12:14:48 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:48 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r0}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:14:48 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:02 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:02 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:02 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:02 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r5}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r6, {r7, r8}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3, r3}, {0x2, 0x7, r4}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r8}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:02 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r0}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r0}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:02 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:15:02 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:02 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:02 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:15:16 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r0}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r0}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r0}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1412.479031] Process accounting paused 12:15:16 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0) stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r1) 12:15:29 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:29 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:29 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:29 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:29 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:29 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 12:15:29 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r5}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r6, {r7, r8}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3, r3}, {0x2, 0x7, r4}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r8}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:29 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:29 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:15:29 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:30 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:30 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:44 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:15:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 12:15:44 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:44 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:44 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:45 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:45 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:45 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:45 executing program 2: mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 12:15:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18) stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r2) 12:15:45 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:45 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:15:45 executing program 2: mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:45 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:59 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r5}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r6, {r7, r8}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3, r3}, {0x2, 0x7, r4}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r8}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:59 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:59 executing program 2: mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:59 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:59 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:15:59 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:00 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:00 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:00 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1) stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r3) 12:16:00 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:00 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:00 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:00 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1455.929105] Process accounting resumed 12:16:14 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, 0x0) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:16:14 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:16:14 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:16:14 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0]) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:14 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:27 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:16:27 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, 0x0, 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:27 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:27 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:16:27 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0]) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:16:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, 0x0, 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0]) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1496.284974] Process accounting paused 12:16:40 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, 0x0, 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}}) stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r3) 12:16:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:40 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB]) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}}) stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r3) 12:16:57 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB]) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:16:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:16:57 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:16:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:16:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB]) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:16:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:15 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r5}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r6, {r7, r8}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3, r3}, {0x2, 0x7, r4}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r8}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:15 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:17:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}}) stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r3) 12:17:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:15 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:15 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:15 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:15 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:15 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) [ 1530.924147] Process accounting resumed 12:17:15 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:17:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:15 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r5}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r6, {r7, r8}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3, r3}, {0x2, 0x7, r4}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r8}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:15 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:30 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:30 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:30 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:30 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 12:17:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:30 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:30 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:30 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 12:17:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:17:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:17:30 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:30 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:30 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:44 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:44 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:44 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:44 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:44 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:44 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:17:44 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:45 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:45 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:45 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:17:45 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:17:45 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1560.989088] Process accounting paused 12:18:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:01 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:01 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:01 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:01 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:01 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:01 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:01 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:01 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:01 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:01 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:01 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}}) getgid() setresuid(0xffffffffffffffff, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r2) 12:18:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:18 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:18 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:18 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r6}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:18 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:18 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:18 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) [ 1594.167112] Process accounting resumed 12:18:18 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:18 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:18 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 12:18:18 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x100000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:32 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 12:18:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}}) getgid() stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r3) 12:18:32 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:32 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:32 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:32 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:18:32 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:32 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:32 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:32 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:32 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 12:18:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:32 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:18:32 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:32 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:18:32 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:32 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:32 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:45 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:45 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:18:45 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:45 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:45 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:45 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:18:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:45 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:45 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:18:45 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:18:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:19:00 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:00 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:00 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsro', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:00 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:19:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:00 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:19:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:00 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 12:19:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:19:00 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) [ 1636.224952] Process accounting paused 12:19:00 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:00 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsro', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:13 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 12:19:13 executing program 6: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r6}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:13 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:13 executing program 7: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:19:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:13 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsro', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:13 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:19:13 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 12:19:13 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:13 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:19:13 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:13 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x18) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}}) getgid() stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x202003, 0x3) setresuid(0xffffffffffffffff, r3, 0x0) r5 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r5) keyctl$chown(0x4, r5, 0xee00, r4) 12:19:13 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:14 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) [ 1663.019644] FAULT_INJECTION: forcing a failure. [ 1663.019644] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1663.021000] CPU: 1 PID: 9299 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1663.021736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1663.022647] Call Trace: [ 1663.022947] dump_stack+0x107/0x167 [ 1663.023345] should_fail.cold+0x5/0xa [ 1663.023761] strncpy_from_user+0x34/0x470 [ 1663.024215] __do_sys_add_key+0xa9/0x430 [ 1663.024658] ? __do_sys_request_key+0x3b0/0x3b0 [ 1663.025158] ? ksys_write+0x1a9/0x260 [ 1663.025563] ? __ia32_sys_read+0xb0/0xb0 [ 1663.026011] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1663.026598] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1663.027167] do_syscall_64+0x33/0x40 [ 1663.027577] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1663.028134] RIP: 0033:0x7f6afab3cb19 [ 1663.028539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1663.030504] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1663.031359] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1663.032122] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1663.032885] RBP: 00007f6af80b21d0 R08: 0000000035c89f06 R09: 0000000000000000 [ 1663.033643] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1663.034442] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:19:27 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 1) 12:19:27 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x18) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}}) getgid() stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x202003, 0x3) setresuid(0xffffffffffffffff, r3, 0x0) r5 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r5) keyctl$chown(0x4, r5, 0xee00, r4) 12:19:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:19:27 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:27 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:27 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:19:27 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:27 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:27 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:19:27 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 2) [ 1663.118980] FAULT_INJECTION: forcing a failure. [ 1663.118980] name failslab, interval 1, probability 0, space 0, times 0 [ 1663.120253] CPU: 1 PID: 9319 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1663.120999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1663.121911] Call Trace: [ 1663.122262] dump_stack+0x107/0x167 [ 1663.122668] should_fail.cold+0x5/0xa [ 1663.123100] should_failslab+0x5/0x20 [ 1663.123514] __kmalloc_track_caller+0x79/0x370 [ 1663.124011] ? strndup_user+0x74/0xe0 [ 1663.124424] ? __check_object_size+0xae/0x440 [ 1663.124928] memdup_user+0x22/0xd0 [ 1663.125315] strndup_user+0x74/0xe0 [ 1663.125717] __do_sys_add_key+0x131/0x430 [ 1663.126183] ? __do_sys_request_key+0x3b0/0x3b0 [ 1663.126676] ? ksys_write+0x1a9/0x260 [ 1663.127092] ? __ia32_sys_read+0xb0/0xb0 [ 1663.127536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1663.128110] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1663.128124] do_syscall_64+0x33/0x40 [ 1663.128135] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1663.128142] RIP: 0033:0x7f6afab3cb19 [ 1663.128153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1663.128158] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1663.128170] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 12:19:27 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 3) 12:19:27 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) [ 1663.128177] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1663.128182] RBP: 00007f6af80b21d0 R08: 000000000bce27eb R09: 0000000000000000 [ 1663.128189] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1663.128194] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 [ 1663.230007] FAULT_INJECTION: forcing a failure. [ 1663.230007] name failslab, interval 1, probability 0, space 0, times 0 [ 1663.231333] CPU: 1 PID: 9324 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1663.232097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1663.233007] Call Trace: [ 1663.233304] dump_stack+0x107/0x167 [ 1663.233719] should_fail.cold+0x5/0xa [ 1663.234174] ? create_object.isra.0+0x3a/0xa20 [ 1663.234693] should_failslab+0x5/0x20 [ 1663.235129] kmem_cache_alloc+0x5b/0x310 [ 1663.235588] create_object.isra.0+0x3a/0xa20 [ 1663.236086] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1663.236660] __kmalloc_track_caller+0x177/0x370 [ 1663.237201] ? strndup_user+0x74/0xe0 [ 1663.237631] ? __check_object_size+0xae/0x440 [ 1663.238148] memdup_user+0x22/0xd0 [ 1663.238551] strndup_user+0x74/0xe0 [ 1663.238967] __do_sys_add_key+0x131/0x430 [ 1663.239429] ? __do_sys_request_key+0x3b0/0x3b0 [ 1663.239953] ? ksys_write+0x1a9/0x260 [ 1663.240382] ? __ia32_sys_read+0xb0/0xb0 [ 1663.240845] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1663.241443] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1663.242026] do_syscall_64+0x33/0x40 [ 1663.242462] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1663.243043] RIP: 0033:0x7f6afab3cb19 [ 1663.243464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1663.245540] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1663.246424] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1663.247243] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1663.248053] RBP: 00007f6af80b21d0 R08: 0000000024c380d4 R09: 0000000000000000 [ 1663.248861] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1663.249677] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:19:41 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 4) 12:19:41 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:19:41 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:41 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:41 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:19:41 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 1) [ 1677.278823] FAULT_INJECTION: forcing a failure. [ 1677.278823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1677.281431] CPU: 1 PID: 9336 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1677.282935] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1677.284727] Call Trace: [ 1677.285311] dump_stack+0x107/0x167 [ 1677.286113] should_fail.cold+0x5/0xa [ 1677.286955] _copy_from_user+0x2e/0x1b0 [ 1677.287820] memdup_user+0x65/0xd0 [ 1677.288592] strndup_user+0x74/0xe0 [ 1677.289386] __do_sys_add_key+0x131/0x430 [ 1677.290292] ? __do_sys_request_key+0x3b0/0x3b0 [ 1677.291297] ? ksys_write+0x1a9/0x260 [ 1677.292121] ? __ia32_sys_read+0xb0/0xb0 [ 1677.293004] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1677.294137] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1677.295279] do_syscall_64+0x33/0x40 [ 1677.296085] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1677.297191] RIP: 0033:0x7f6afab3cb19 [ 1677.297995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1677.301963] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1677.303610] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1677.305148] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1677.306709] RBP: 00007f6af80b21d0 R08: 000000000dd8ea99 R09: 0000000000000000 [ 1677.308248] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1677.309786] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:19:41 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:19:41 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1677.332689] FAULT_INJECTION: forcing a failure. [ 1677.332689] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1677.334083] CPU: 0 PID: 9349 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1677.334853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1677.335749] Call Trace: [ 1677.336041] dump_stack+0x107/0x167 [ 1677.336453] should_fail.cold+0x5/0xa [ 1677.336872] strncpy_from_user+0x34/0x470 [ 1677.337338] __do_sys_add_key+0xa9/0x430 [ 1677.337784] ? __do_sys_request_key+0x3b0/0x3b0 [ 1677.338302] ? ksys_write+0x1a9/0x260 [ 1677.338713] ? __ia32_sys_read+0xb0/0xb0 [ 1677.339170] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1677.339758] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1677.340323] do_syscall_64+0x33/0x40 [ 1677.340746] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1677.341297] RIP: 0033:0x7f4453ef4b19 [ 1677.341708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1677.343738] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1677.344567] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1677.345351] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1677.346133] RBP: 00007f445146a1d0 R08: 0000000004b3e8bd R09: 0000000000000000 [ 1677.346915] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1677.347693] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:19:41 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:19:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) [ 1677.480471] Process accounting resumed 12:19:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) [ 1691.852906] FAULT_INJECTION: forcing a failure. [ 1691.852906] name failslab, interval 1, probability 0, space 0, times 0 [ 1691.855457] CPU: 0 PID: 9367 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1691.856951] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1691.858774] Call Trace: [ 1691.859361] dump_stack+0x107/0x167 [ 1691.860167] should_fail.cold+0x5/0xa [ 1691.861013] should_failslab+0x5/0x20 [ 1691.861855] __kmalloc_track_caller+0x79/0x370 [ 1691.862892] ? strndup_user+0x74/0xe0 [ 1691.863727] ? __check_object_size+0xae/0x440 [ 1691.864907] memdup_user+0x22/0xd0 [ 1691.865694] strndup_user+0x74/0xe0 [ 1691.866509] __do_sys_add_key+0x131/0x430 [ 1691.867423] ? __do_sys_request_key+0x3b0/0x3b0 [ 1691.868442] ? ksys_write+0x1a9/0x260 [ 1691.869279] ? __ia32_sys_read+0xb0/0xb0 [ 1691.870178] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1691.871343] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1691.872481] do_syscall_64+0x33/0x40 [ 1691.873304] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1691.874443] RIP: 0033:0x7f4453ef4b19 [ 1691.875262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1691.879293] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1691.880962] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1691.882518] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1691.884066] RBP: 00007f445146a1d0 R08: 000000002b0815bc R09: 0000000000000000 [ 1691.885612] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1691.887174] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:19:56 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:56 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 2) 12:19:56 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:56 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:19:56 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 5) 12:19:56 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:19:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:19:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) [ 1691.951381] FAULT_INJECTION: forcing a failure. [ 1691.951381] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1691.954064] CPU: 0 PID: 9380 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1691.955556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1691.957340] Call Trace: [ 1691.957916] dump_stack+0x107/0x167 [ 1691.958716] should_fail.cold+0x5/0xa [ 1691.959546] __alloc_pages_nodemask+0x182/0x600 [ 1691.960546] ? lock_acquire+0x197/0x470 [ 1691.961403] ? find_held_lock+0x2c/0x110 [ 1691.962286] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1691.963610] kmalloc_large_node+0x55/0x1a0 [ 1691.964526] __kmalloc_node+0x30d/0x420 [ 1691.965386] kvmalloc_node+0xc0/0x170 [ 1691.966205] __do_sys_add_key+0x311/0x430 [ 1691.967117] ? __do_sys_request_key+0x3b0/0x3b0 [ 1691.968110] ? ksys_write+0x1a9/0x260 [ 1691.968934] ? __ia32_sys_read+0xb0/0xb0 [ 1691.969807] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1691.970940] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1691.972046] do_syscall_64+0x33/0x40 [ 1691.972842] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1691.973932] RIP: 0033:0x7f6afab3cb19 [ 1691.974742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1691.978652] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1691.980274] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1691.981792] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1691.983319] RBP: 00007f6af80b21d0 R08: 000000001cce91c0 R09: 0000000000000000 [ 1691.984839] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1691.986353] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:19:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:19:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:19:56 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:19:56 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x0, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:19:56 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 6) [ 1692.086769] FAULT_INJECTION: forcing a failure. [ 1692.086769] name failslab, interval 1, probability 0, space 0, times 0 [ 1692.088492] CPU: 0 PID: 9389 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1692.089505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1692.090743] Call Trace: [ 1692.091153] dump_stack+0x107/0x167 [ 1692.091701] should_fail.cold+0x5/0xa [ 1692.092277] ? create_object.isra.0+0x3a/0xa20 [ 1692.092974] should_failslab+0x5/0x20 [ 1692.093559] kmem_cache_alloc+0x5b/0x310 [ 1692.094166] create_object.isra.0+0x3a/0xa20 [ 1692.094844] ? kasan_unpoison_shadow+0x33/0x50 [ 1692.095549] kmalloc_large_node+0x124/0x1a0 [ 1692.096203] __kmalloc_node+0x30d/0x420 [ 1692.096812] kvmalloc_node+0xc0/0x170 [ 1692.097366] __do_sys_add_key+0x311/0x430 [ 1692.097984] ? __do_sys_request_key+0x3b0/0x3b0 [ 1692.098684] ? ksys_write+0x1a9/0x260 [ 1692.099242] ? __ia32_sys_read+0xb0/0xb0 [ 1692.099868] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1692.100645] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1692.101417] do_syscall_64+0x33/0x40 [ 1692.101974] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1692.102735] RIP: 0033:0x7f6afab3cb19 [ 1692.103283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1692.105963] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1692.107102] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1692.108159] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1692.109204] RBP: 00007f6af80b21d0 R08: 0000000025612e02 R09: 0000000000000000 [ 1692.110360] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1692.111435] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:19:56 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 3) 12:19:56 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:19:56 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1692.181913] FAULT_INJECTION: forcing a failure. [ 1692.181913] name failslab, interval 1, probability 0, space 0, times 0 [ 1692.183566] CPU: 1 PID: 9397 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1692.184510] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1692.185659] Call Trace: [ 1692.186037] dump_stack+0x107/0x167 [ 1692.186555] should_fail.cold+0x5/0xa [ 1692.187088] ? create_object.isra.0+0x3a/0xa20 [ 1692.187736] should_failslab+0x5/0x20 [ 1692.188271] kmem_cache_alloc+0x5b/0x310 [ 1692.188840] create_object.isra.0+0x3a/0xa20 [ 1692.189452] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1692.190161] __kmalloc_track_caller+0x177/0x370 [ 1692.190803] ? strndup_user+0x74/0xe0 [ 1692.191339] ? __check_object_size+0xae/0x440 [ 1692.191976] memdup_user+0x22/0xd0 [ 1692.192474] strndup_user+0x74/0xe0 [ 1692.192998] __do_sys_add_key+0x131/0x430 [ 1692.193590] ? __do_sys_request_key+0x3b0/0x3b0 [ 1692.194231] ? ksys_write+0x1a9/0x260 [ 1692.194757] ? __ia32_sys_read+0xb0/0xb0 [ 1692.195338] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1692.196069] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1692.196796] do_syscall_64+0x33/0x40 [ 1692.197308] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1692.198018] RIP: 0033:0x7f4453ef4b19 [ 1692.198525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1692.201067] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1692.202099] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1692.203107] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1692.204092] RBP: 00007f445146a1d0 R08: 0000000032c0dea9 R09: 0000000000000000 [ 1692.205141] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1692.206186] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:20:10 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:20:10 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x0, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1705.715073] FAULT_INJECTION: forcing a failure. [ 1705.715073] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1705.716393] CPU: 1 PID: 9410 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1705.717111] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1705.718003] Call Trace: [ 1705.718294] dump_stack+0x107/0x167 [ 1705.718694] should_fail.cold+0x5/0xa [ 1705.719104] _copy_from_user+0x2e/0x1b0 [ 1705.719535] __do_sys_add_key+0x345/0x430 [ 1705.719978] ? __do_sys_request_key+0x3b0/0x3b0 [ 1705.720486] ? ksys_write+0x1a9/0x260 [ 1705.720902] ? __ia32_sys_read+0xb0/0xb0 [ 1705.721341] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1705.721912] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1705.722470] do_syscall_64+0x33/0x40 [ 1705.722885] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1705.723435] RIP: 0033:0x7f6afab3cb19 [ 1705.723834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.725792] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1705.726624] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1705.727398] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1705.728164] RBP: 00007f6af80b21d0 R08: 0000000015c23476 R09: 0000000000000000 [ 1705.728945] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1705.729717] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:20:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:20:10 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 4) 12:20:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:20:10 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:20:10 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:10 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 7) [ 1705.754846] FAULT_INJECTION: forcing a failure. [ 1705.754846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1705.757523] CPU: 0 PID: 9419 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1705.759117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1705.760940] Call Trace: [ 1705.761519] dump_stack+0x107/0x167 [ 1705.762321] should_fail.cold+0x5/0xa [ 1705.763174] _copy_from_user+0x2e/0x1b0 [ 1705.764052] memdup_user+0x65/0xd0 [ 1705.764837] strndup_user+0x74/0xe0 [ 1705.765632] __do_sys_add_key+0x131/0x430 [ 1705.766541] ? __do_sys_request_key+0x3b0/0x3b0 [ 1705.767612] ? ksys_write+0x1a9/0x260 [ 1705.768444] ? __ia32_sys_read+0xb0/0xb0 [ 1705.769334] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1705.770479] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1705.771612] do_syscall_64+0x33/0x40 [ 1705.772428] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1705.773534] RIP: 0033:0x7f4453ef4b19 [ 1705.774342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.778322] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1705.779983] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1705.781523] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1705.783083] RBP: 00007f445146a1d0 R08: 00000000289658a0 R09: 0000000000000000 [ 1705.784620] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1705.786159] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:20:10 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:20:10 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:20:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:20:10 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 8) 12:20:10 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:10 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x0, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:10 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) [ 1705.882426] FAULT_INJECTION: forcing a failure. [ 1705.882426] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1705.883974] CPU: 1 PID: 9431 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1705.884741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1705.885652] Call Trace: [ 1705.885960] dump_stack+0x107/0x167 [ 1705.886364] should_fail.cold+0x5/0xa [ 1705.886807] __alloc_pages_nodemask+0x182/0x600 [ 1705.887316] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1705.887982] ? mark_held_locks+0x9e/0xe0 [ 1705.888428] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1705.888999] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1705.889592] ? trace_hardirqs_on+0x5b/0x180 [ 1705.890074] alloc_pages_current+0x187/0x280 [ 1705.890561] kmalloc_order+0x35/0x160 [ 1705.890999] kmalloc_order_trace+0x14/0xa0 [ 1705.891476] dns_resolver_preparse+0x54b/0x8b0 [ 1705.891970] ? lock_release+0x680/0x680 [ 1705.892406] ? dns_resolver_free_preparse+0x40/0x40 [ 1705.892957] ? find_held_lock+0x2c/0x110 [ 1705.893394] ? down_read+0x10f/0x430 [ 1705.893807] ? down_write+0x160/0x160 [ 1705.894226] ? key_task_permission+0x2b5/0x400 [ 1705.894736] ? dns_resolver_free_preparse+0x40/0x40 [ 1705.895267] key_create_or_update+0x3e0/0xc30 [ 1705.895753] ? key_alloc+0x1280/0x1280 [ 1705.896166] ? join_session_keyring+0x350/0x350 [ 1705.896667] ? exc_page_fault+0xca/0x1a0 [ 1705.897125] ? copy_user_generic_string+0x2c/0x40 [ 1705.897652] __do_sys_add_key+0x215/0x430 [ 1705.898107] ? __do_sys_request_key+0x3b0/0x3b0 [ 1705.898622] ? ksys_write+0x1a9/0x260 [ 1705.899042] ? __ia32_sys_read+0xb0/0xb0 [ 1705.899493] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1705.900056] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1705.900632] do_syscall_64+0x33/0x40 [ 1705.901039] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1705.901611] RIP: 0033:0x7f6afab3cb19 [ 1705.902007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.904054] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1705.904875] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1705.905651] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1705.906422] RBP: 00007f6af80b21d0 R08: 000000000bf33f35 R09: 0000000000000000 [ 1705.907222] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1705.907999] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:20:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:20:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:20:25 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:25 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:20:25 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 5) 12:20:25 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:25 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:25 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 9) [ 1721.165178] FAULT_INJECTION: forcing a failure. [ 1721.165178] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1721.167930] CPU: 0 PID: 9458 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1721.168936] FAULT_INJECTION: forcing a failure. [ 1721.168936] name failslab, interval 1, probability 0, space 0, times 0 [ 1721.169342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1721.169349] Call Trace: [ 1721.169382] dump_stack+0x107/0x167 [ 1721.173843] should_fail.cold+0x5/0xa [ 1721.174616] __alloc_pages_nodemask+0x182/0x600 [ 1721.175551] ? lock_acquire+0x197/0x470 [ 1721.176349] ? find_held_lock+0x2c/0x110 [ 1721.177171] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1721.178396] kmalloc_large_node+0x55/0x1a0 [ 1721.179252] __kmalloc_node+0x30d/0x420 [ 1721.180068] kvmalloc_node+0xc0/0x170 [ 1721.180841] __do_sys_add_key+0x311/0x430 [ 1721.181677] ? __do_sys_request_key+0x3b0/0x3b0 [ 1721.182617] ? ksys_write+0x1a9/0x260 [ 1721.183402] ? __ia32_sys_read+0xb0/0xb0 [ 1721.184221] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1721.185278] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1721.186315] do_syscall_64+0x33/0x40 [ 1721.187076] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1721.188106] RIP: 0033:0x7f4453ef4b19 [ 1721.188856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1721.192577] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1721.194107] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1721.195559] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1721.197000] RBP: 00007f445146a1d0 R08: 0000000006bd5a17 R09: 0000000000000000 [ 1721.198438] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1721.199900] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 [ 1721.201369] CPU: 1 PID: 9456 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1721.202353] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1721.203545] Call Trace: [ 1721.203931] dump_stack+0x107/0x167 [ 1721.204460] should_fail.cold+0x5/0xa [ 1721.205012] ? create_object.isra.0+0x3a/0xa20 [ 1721.205675] should_failslab+0x5/0x20 [ 1721.206224] kmem_cache_alloc+0x5b/0x310 [ 1721.206819] create_object.isra.0+0x3a/0xa20 [ 1721.207453] ? kasan_unpoison_shadow+0x33/0x50 [ 1721.208118] kmalloc_order+0xfe/0x160 [ 1721.208672] kmalloc_order_trace+0x14/0xa0 [ 1721.209289] dns_resolver_preparse+0x54b/0x8b0 [ 1721.209949] ? lock_release+0x680/0x680 [ 1721.210529] ? dns_resolver_free_preparse+0x40/0x40 [ 1721.211262] ? find_held_lock+0x2c/0x110 [ 1721.211860] ? down_read+0x10f/0x430 [ 1721.212397] ? down_write+0x160/0x160 [ 1721.212955] ? key_task_permission+0x2b5/0x400 [ 1721.213612] ? dns_resolver_free_preparse+0x40/0x40 [ 1721.214329] key_create_or_update+0x3e0/0xc30 [ 1721.214986] ? key_alloc+0x1280/0x1280 [ 1721.215546] ? join_session_keyring+0x350/0x350 [ 1721.216219] ? exc_page_fault+0xca/0x1a0 [ 1721.216822] ? copy_user_generic_string+0x2c/0x40 [ 1721.217523] __do_sys_add_key+0x215/0x430 [ 1721.218117] ? __do_sys_request_key+0x3b0/0x3b0 [ 1721.218783] ? ksys_write+0x1a9/0x260 [ 1721.219325] ? __ia32_sys_read+0xb0/0xb0 [ 1721.219907] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1721.220653] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1721.221390] do_syscall_64+0x33/0x40 [ 1721.221922] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1721.222650] RIP: 0033:0x7f6afab3cb19 [ 1721.223191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1721.225806] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1721.226896] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1721.227917] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1721.228931] RBP: 00007f6af80b21d0 R08: 000000002f3d20bd R09: 0000000000000000 [ 1721.229946] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1721.230965] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:20:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:20:25 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1721.274961] Process accounting paused 12:20:25 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:20:25 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:20:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:20:25 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 10) 12:20:25 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:25 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 6) 12:20:25 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:25 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) [ 1721.441585] FAULT_INJECTION: forcing a failure. [ 1721.441585] name failslab, interval 1, probability 0, space 0, times 0 [ 1721.444189] CPU: 0 PID: 9475 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1721.445554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1721.447218] Call Trace: [ 1721.447753] dump_stack+0x107/0x167 [ 1721.448487] should_fail.cold+0x5/0xa [ 1721.449252] ? assoc_array_insert+0xde/0x2aa0 [ 1721.450152] should_failslab+0x5/0x20 [ 1721.450932] kmem_cache_alloc_trace+0x55/0x320 [ 1721.451872] assoc_array_insert+0xde/0x2aa0 [ 1721.452753] ? lock_release+0x680/0x680 [ 1721.453567] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1721.454675] ? assoc_array_cancel_edit+0x90/0x90 [ 1721.455647] ? down_write+0xe0/0x160 [ 1721.456401] ? down_write_killable+0x180/0x180 [ 1721.457327] ? key_free_user_ns+0x130/0x130 [ 1721.458206] __key_link_begin+0xec/0x250 [ 1721.459034] key_create_or_update+0x468/0xc30 [ 1721.459942] ? key_alloc+0x1280/0x1280 [ 1721.460727] ? join_session_keyring+0x350/0x350 [ 1721.461671] ? exc_page_fault+0xca/0x1a0 [ 1721.462521] ? copy_user_generic_string+0x2c/0x40 [ 1721.463526] __do_sys_add_key+0x215/0x430 [ 1721.464366] ? __do_sys_request_key+0x3b0/0x3b0 [ 1721.465312] ? ksys_write+0x1a9/0x260 [ 1721.466085] ? __ia32_sys_read+0xb0/0xb0 [ 1721.466938] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1721.468008] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1721.469064] do_syscall_64+0x33/0x40 [ 1721.469821] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1721.470871] RIP: 0033:0x7f6afab3cb19 [ 1721.471627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1721.475338] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1721.476874] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1721.478298] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1721.479732] RBP: 00007f6af80b21d0 R08: 000000002b890bd2 R09: 0000000000000000 [ 1721.481157] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1721.482586] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 [ 1721.499594] FAULT_INJECTION: forcing a failure. [ 1721.499594] name failslab, interval 1, probability 0, space 0, times 0 [ 1721.501145] CPU: 1 PID: 9482 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1721.502055] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1721.503153] Call Trace: [ 1721.503513] dump_stack+0x107/0x167 [ 1721.504012] should_fail.cold+0x5/0xa [ 1721.504540] ? create_object.isra.0+0x3a/0xa20 [ 1721.505151] should_failslab+0x5/0x20 [ 1721.505662] kmem_cache_alloc+0x5b/0x310 [ 1721.506215] create_object.isra.0+0x3a/0xa20 [ 1721.506807] ? kasan_unpoison_shadow+0x33/0x50 [ 1721.507436] kmalloc_large_node+0x124/0x1a0 [ 1721.508013] __kmalloc_node+0x30d/0x420 [ 1721.508574] kvmalloc_node+0xc0/0x170 [ 1721.509104] __do_sys_add_key+0x311/0x430 [ 1721.509694] ? __do_sys_request_key+0x3b0/0x3b0 [ 1721.510352] ? ksys_write+0x1a9/0x260 [ 1721.510885] ? __ia32_sys_read+0xb0/0xb0 [ 1721.511459] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1721.512196] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1721.512929] do_syscall_64+0x33/0x40 [ 1721.513451] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1721.514184] RIP: 0033:0x7f4453ef4b19 [ 1721.514703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1721.517250] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1721.518314] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1721.519319] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1721.520314] RBP: 00007f445146a1d0 R08: 000000002e850e54 R09: 0000000000000000 [ 1721.521304] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1721.522294] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:20:39 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 7) 12:20:39 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 11) 12:20:39 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:20:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:20:39 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:20:39 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:20:39 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fow', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) [ 1734.843800] FAULT_INJECTION: forcing a failure. [ 1734.843800] name failslab, interval 1, probability 0, space 0, times 0 [ 1734.845071] CPU: 1 PID: 9499 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1734.845813] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1734.846694] Call Trace: [ 1734.846992] dump_stack+0x107/0x167 [ 1734.847403] should_fail.cold+0x5/0xa [ 1734.847816] ? create_object.isra.0+0x3a/0xa20 [ 1734.848313] should_failslab+0x5/0x20 [ 1734.848726] kmem_cache_alloc+0x5b/0x310 [ 1734.849165] create_object.isra.0+0x3a/0xa20 [ 1734.849641] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1734.850203] kmem_cache_alloc_trace+0x151/0x320 [ 1734.850708] assoc_array_insert+0xde/0x2aa0 [ 1734.851184] ? lock_release+0x680/0x680 [ 1734.851622] ? io_schedule_timeout+0x140/0x140 [ 1734.852138] ? dns_resolver_free_preparse+0x40/0x40 [ 1734.852679] ? assoc_array_cancel_edit+0x90/0x90 [ 1734.853201] ? down_write+0xe0/0x160 [ 1734.853602] ? down_write_killable+0x180/0x180 [ 1734.854098] ? key_free_user_ns+0x130/0x130 [ 1734.854562] __key_link_begin+0xec/0x250 [ 1734.855019] key_create_or_update+0x468/0xc30 [ 1734.855523] ? key_alloc+0x1280/0x1280 [ 1734.855942] ? join_session_keyring+0x350/0x350 [ 1734.856450] ? exc_page_fault+0xca/0x1a0 [ 1734.856910] ? copy_user_generic_string+0x2c/0x40 [ 1734.857434] __do_sys_add_key+0x215/0x430 [ 1734.857542] FAULT_INJECTION: forcing a failure. [ 1734.857542] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1734.857888] ? __do_sys_request_key+0x3b0/0x3b0 [ 1734.860650] ? ksys_write+0x1a9/0x260 [ 1734.861055] ? __ia32_sys_read+0xb0/0xb0 [ 1734.861497] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1734.862065] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1734.862617] do_syscall_64+0x33/0x40 [ 1734.863035] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1734.863591] RIP: 0033:0x7f6afab3cb19 [ 1734.863997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1734.866005] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1734.866825] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1734.867597] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1734.868368] RBP: 00007f6af80b21d0 R08: 0000000014659402 R09: 0000000000000000 [ 1734.869137] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1734.869908] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 [ 1734.870713] CPU: 0 PID: 9501 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1734.872604] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1734.874823] Call Trace: [ 1734.875506] dump_stack+0x107/0x167 [ 1734.876414] should_fail.cold+0x5/0xa [ 1734.877416] _copy_from_user+0x2e/0x1b0 [ 1734.878367] __do_sys_add_key+0x345/0x430 [ 1734.879398] ? __do_sys_request_key+0x3b0/0x3b0 [ 1734.880658] ? ksys_write+0x1a9/0x260 [ 1734.881691] ? __ia32_sys_read+0xb0/0xb0 [ 1734.882728] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1734.883866] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1734.884923] do_syscall_64+0x33/0x40 [ 1734.885669] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1734.886716] RIP: 0033:0x7f4453ef4b19 [ 1734.887479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1734.891237] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1734.892760] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1734.894183] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1734.895630] RBP: 00007f445146a1d0 R08: 000000003d5f98fc R09: 0000000000000000 [ 1734.897053] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1734.898473] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:20:39 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 12) 12:20:39 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:20:39 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:20:39 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:20:39 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) [ 1734.958122] FAULT_INJECTION: forcing a failure. [ 1734.958122] name failslab, interval 1, probability 0, space 0, times 0 [ 1734.959461] CPU: 1 PID: 9508 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1734.960205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1734.961099] Call Trace: [ 1734.961404] dump_stack+0x107/0x167 [ 1734.961803] should_fail.cold+0x5/0xa [ 1734.962219] ? assoc_array_insert+0x73f/0x2aa0 [ 1734.962727] should_failslab+0x5/0x20 [ 1734.963150] kmem_cache_alloc_trace+0x55/0x320 [ 1734.963668] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1734.964233] assoc_array_insert+0x73f/0x2aa0 [ 1734.964728] ? lock_release+0x680/0x680 [ 1734.965171] ? dns_resolver_preparse+0x60e/0x8b0 [ 1734.965699] ? lock_release+0x680/0x680 [ 1734.966109] ? dns_resolver_free_preparse+0x40/0x40 [ 1734.966666] ? assoc_array_cancel_edit+0x90/0x90 [ 1734.967206] ? down_write+0xe0/0x160 [ 1734.967611] ? down_write_killable+0x180/0x180 [ 1734.968110] ? key_free_user_ns+0x130/0x130 [ 1734.968551] __key_link_begin+0xec/0x250 [ 1734.969001] key_create_or_update+0x468/0xc30 [ 1734.969514] ? key_alloc+0x1280/0x1280 [ 1734.969941] ? join_session_keyring+0x350/0x350 [ 1734.970460] ? exc_page_fault+0xca/0x1a0 [ 1734.970927] ? copy_user_generic_string+0x2c/0x40 [ 1734.971469] __do_sys_add_key+0x215/0x430 [ 1734.971930] ? __do_sys_request_key+0x3b0/0x3b0 [ 1734.972433] ? ksys_write+0x1a9/0x260 [ 1734.972853] ? __ia32_sys_read+0xb0/0xb0 [ 1734.973296] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1734.973870] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1734.974437] do_syscall_64+0x33/0x40 [ 1734.974859] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1734.975430] RIP: 0033:0x7f6afab3cb19 [ 1734.975840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1734.977835] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1734.978681] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1734.979461] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1734.980194] RBP: 00007f6af80b21d0 R08: 0000000015981223 R09: 0000000000000000 [ 1734.980984] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1734.981769] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:20:39 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fow', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:39 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:39 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 13) [ 1735.109322] FAULT_INJECTION: forcing a failure. [ 1735.109322] name failslab, interval 1, probability 0, space 0, times 0 [ 1735.111770] CPU: 0 PID: 9518 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1735.113150] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1735.114830] Call Trace: [ 1735.115379] dump_stack+0x107/0x167 [ 1735.116129] should_fail.cold+0x5/0xa [ 1735.116911] ? create_object.isra.0+0x3a/0xa20 [ 1735.117952] should_failslab+0x5/0x20 [ 1735.118725] kmem_cache_alloc+0x5b/0x310 [ 1735.119581] create_object.isra.0+0x3a/0xa20 [ 1735.120487] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1735.121533] kmem_cache_alloc_trace+0x151/0x320 [ 1735.122492] assoc_array_insert+0x73f/0x2aa0 [ 1735.123416] ? lock_release+0x680/0x680 [ 1735.124236] ? dns_resolver_preparse+0x60e/0x8b0 [ 1735.125203] ? lock_release+0x680/0x680 [ 1735.126036] ? dns_resolver_free_preparse+0x40/0x40 [ 1735.127074] ? assoc_array_cancel_edit+0x90/0x90 [ 1735.128048] ? down_write+0xe0/0x160 [ 1735.128805] ? down_write_killable+0x180/0x180 [ 1735.129724] ? key_free_user_ns+0x130/0x130 [ 1735.130601] __key_link_begin+0xec/0x250 [ 1735.131434] key_create_or_update+0x468/0xc30 [ 1735.132339] ? key_alloc+0x1280/0x1280 [ 1735.133123] ? join_session_keyring+0x350/0x350 [ 1735.134054] ? exc_page_fault+0xca/0x1a0 [ 1735.134894] ? copy_user_generic_string+0x2c/0x40 [ 1735.135881] __do_sys_add_key+0x215/0x430 [ 1735.136727] ? __do_sys_request_key+0x3b0/0x3b0 [ 1735.137651] ? ksys_write+0x1a9/0x260 [ 1735.138414] ? __ia32_sys_read+0xb0/0xb0 [ 1735.139252] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1735.140298] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1735.141345] do_syscall_64+0x33/0x40 [ 1735.142090] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1735.143132] RIP: 0033:0x7f6afab3cb19 [ 1735.143886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1735.147591] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1735.149109] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1735.150543] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1735.151989] RBP: 00007f6af80b21d0 R08: 0000000015ed1f26 R09: 0000000000000000 [ 1735.153420] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1735.154857] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:20:53 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:53 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 14) 12:20:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:20:53 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:20:53 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:20:53 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fow', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:53 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 8) [ 1748.965811] FAULT_INJECTION: forcing a failure. [ 1748.965811] name failslab, interval 1, probability 0, space 0, times 0 [ 1748.966286] FAULT_INJECTION: forcing a failure. [ 1748.966286] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1748.968229] CPU: 1 PID: 9536 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1748.968247] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1748.973669] Call Trace: [ 1748.974239] dump_stack+0x107/0x167 [ 1748.974991] should_fail.cold+0x5/0xa [ 1748.975801] ? key_alloc+0x3d1/0x1280 [ 1748.976604] should_failslab+0x5/0x20 [ 1748.977393] kmem_cache_alloc+0x5b/0x310 [ 1748.978262] key_alloc+0x3d1/0x1280 [ 1748.979107] ? key_user_lookup+0x560/0x560 [ 1748.980041] key_create_or_update+0x6c3/0xc30 [ 1748.980957] ? key_alloc+0x1280/0x1280 [ 1748.981728] ? join_session_keyring+0x350/0x350 [ 1748.982684] ? exc_page_fault+0xca/0x1a0 [ 1748.983534] ? copy_user_generic_string+0x2c/0x40 [ 1748.984531] __do_sys_add_key+0x215/0x430 [ 1748.985345] ? __do_sys_request_key+0x3b0/0x3b0 [ 1748.986284] ? ksys_write+0x1a9/0x260 [ 1748.987051] ? __ia32_sys_read+0xb0/0xb0 [ 1748.987921] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1748.989001] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1748.990064] do_syscall_64+0x33/0x40 [ 1748.990830] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1748.991849] RIP: 0033:0x7f6afab3cb19 [ 1748.992578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1748.996282] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1748.997820] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1748.999278] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1749.000717] RBP: 00007f6af80b21d0 R08: 000000001d0d0c1a R09: 0000000000000000 [ 1749.002147] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1749.003587] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 [ 1749.005078] CPU: 0 PID: 9540 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1749.006474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1749.008168] Call Trace: [ 1749.008720] dump_stack+0x107/0x167 [ 1749.009491] should_fail.cold+0x5/0xa [ 1749.010278] __alloc_pages_nodemask+0x182/0x600 [ 1749.011245] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1749.012470] ? mark_held_locks+0x9e/0xe0 [ 1749.013315] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1749.014386] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1749.015515] ? trace_hardirqs_on+0x5b/0x180 [ 1749.016406] alloc_pages_current+0x187/0x280 [ 1749.017344] kmalloc_order+0x35/0x160 [ 1749.018281] kmalloc_order_trace+0x14/0xa0 [ 1749.019334] dns_resolver_preparse+0x54b/0x8b0 [ 1749.020434] ? lock_release+0x680/0x680 [ 1749.021409] ? dns_resolver_free_preparse+0x40/0x40 [ 1749.022610] ? find_held_lock+0x2c/0x110 [ 1749.023644] ? down_read+0x10f/0x430 [ 1749.024468] ? down_write+0x160/0x160 [ 1749.025402] ? key_task_permission+0x2b5/0x400 [ 1749.026354] ? dns_resolver_free_preparse+0x40/0x40 [ 1749.027571] key_create_or_update+0x3e0/0xc30 [ 1749.028507] ? key_alloc+0x1280/0x1280 [ 1749.029448] ? join_session_keyring+0x350/0x350 [ 1749.030406] ? exc_page_fault+0xca/0x1a0 [ 1749.031410] ? copy_user_generic_string+0x2c/0x40 [ 1749.032407] __do_sys_add_key+0x215/0x430 [ 1749.033255] ? __do_sys_request_key+0x3b0/0x3b0 [ 1749.034194] ? ksys_write+0x1a9/0x260 [ 1749.034966] ? __ia32_sys_read+0xb0/0xb0 [ 1749.035823] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1749.036891] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1749.037944] do_syscall_64+0x33/0x40 [ 1749.038705] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1749.039758] RIP: 0033:0x7f4453ef4b19 [ 1749.040512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1749.044260] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1749.045800] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1749.047249] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1749.048683] RBP: 00007f445146a1d0 R08: 0000000015b4f5b3 R09: 0000000000000000 [ 1749.050124] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1749.051576] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:20:53 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 15) 12:20:53 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:20:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:20:53 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 9) [ 1749.170971] FAULT_INJECTION: forcing a failure. [ 1749.170971] name failslab, interval 1, probability 0, space 0, times 0 [ 1749.173452] CPU: 0 PID: 9542 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1749.174827] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1749.176488] Call Trace: [ 1749.177020] dump_stack+0x107/0x167 [ 1749.177760] should_fail.cold+0x5/0xa [ 1749.178529] ? create_object.isra.0+0x3a/0xa20 [ 1749.179467] should_failslab+0x5/0x20 [ 1749.180224] kmem_cache_alloc+0x5b/0x310 [ 1749.181051] create_object.isra.0+0x3a/0xa20 [ 1749.181932] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1749.182954] kmem_cache_alloc+0x159/0x310 [ 1749.183809] key_alloc+0x3d1/0x1280 [ 1749.184552] ? key_user_lookup+0x560/0x560 [ 1749.185411] key_create_or_update+0x6c3/0xc30 [ 1749.186316] ? key_alloc+0x1280/0x1280 [ 1749.187090] ? join_session_keyring+0x350/0x350 [ 1749.188023] ? exc_page_fault+0xca/0x1a0 [ 1749.188854] ? copy_user_generic_string+0x2c/0x40 [ 1749.189826] __do_sys_add_key+0x215/0x430 [ 1749.190654] ? __do_sys_request_key+0x3b0/0x3b0 [ 1749.191592] ? ksys_write+0x1a9/0x260 [ 1749.192349] ? __ia32_sys_read+0xb0/0xb0 [ 1749.193161] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1749.194206] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1749.195248] do_syscall_64+0x33/0x40 [ 1749.195989] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1749.197002] RIP: 0033:0x7f6afab3cb19 [ 1749.197740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1749.201387] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1749.202891] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1749.204319] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1749.205733] RBP: 00007f6af80b21d0 R08: 000000003f8ba1be R09: 0000000000000000 [ 1749.207150] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1749.208561] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 [ 1749.245783] FAULT_INJECTION: forcing a failure. [ 1749.245783] name failslab, interval 1, probability 0, space 0, times 0 12:20:53 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1749.248227] CPU: 1 PID: 9547 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1749.249648] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1749.251362] Call Trace: [ 1749.251917] dump_stack+0x107/0x167 [ 1749.252674] should_fail.cold+0x5/0xa [ 1749.253448] ? create_object.isra.0+0x3a/0xa20 12:20:53 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1749.254360] should_failslab+0x5/0x20 [ 1749.255293] kmem_cache_alloc+0x5b/0x310 [ 1749.256123] create_object.isra.0+0x3a/0xa20 [ 1749.257009] ? kasan_unpoison_shadow+0x33/0x50 [ 1749.257956] kmalloc_order+0xfe/0x160 [ 1749.258734] kmalloc_order_trace+0x14/0xa0 [ 1749.259623] dns_resolver_preparse+0x54b/0x8b0 [ 1749.260553] ? lock_release+0x680/0x680 [ 1749.261374] ? dns_resolver_free_preparse+0x40/0x40 [ 1749.262381] ? find_held_lock+0x2c/0x110 [ 1749.263229] ? down_read+0x10f/0x430 [ 1749.263985] ? down_write+0x160/0x160 [ 1749.264761] ? key_task_permission+0x2b5/0x400 [ 1749.265684] ? dns_resolver_free_preparse+0x40/0x40 [ 1749.266689] key_create_or_update+0x3e0/0xc30 [ 1749.267620] ? key_alloc+0x1280/0x1280 [ 1749.268409] ? join_session_keyring+0x350/0x350 [ 1749.269363] ? exc_page_fault+0xca/0x1a0 [ 1749.270216] ? copy_user_generic_string+0x2c/0x40 [ 1749.271244] __do_sys_add_key+0x215/0x430 [ 1749.272101] ? __do_sys_request_key+0x3b0/0x3b0 [ 1749.273043] ? ksys_write+0x1a9/0x260 [ 1749.273822] ? __ia32_sys_read+0xb0/0xb0 [ 1749.274652] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1749.275746] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1749.276791] do_syscall_64+0x33/0x40 [ 1749.277549] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1749.278585] RIP: 0033:0x7f4453ef4b19 [ 1749.279350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1749.283066] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1749.284609] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1749.286046] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1749.287527] RBP: 00007f445146a1d0 R08: 0000000003658378 R09: 0000000000000000 [ 1749.288965] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001 [ 1749.290400] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:21:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:21:07 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:07 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 16) 12:21:07 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:21:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:21:07 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:21:07 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:07 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 10) [ 1763.032328] FAULT_INJECTION: forcing a failure. [ 1763.032328] name failslab, interval 1, probability 0, space 0, times 0 [ 1763.033607] CPU: 1 PID: 9571 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1763.034347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1763.035251] Call Trace: [ 1763.035614] dump_stack+0x107/0x167 [ 1763.036067] should_fail.cold+0x5/0xa [ 1763.036538] ? assoc_array_insert+0xde/0x2aa0 [ 1763.037097] should_failslab+0x5/0x20 [ 1763.037571] kmem_cache_alloc_trace+0x55/0x320 [ 1763.038135] assoc_array_insert+0xde/0x2aa0 [ 1763.038675] ? lock_release+0x680/0x680 [ 1763.039166] ? dns_resolver_preparse+0x60e/0x8b0 [ 1763.039754] ? lock_release+0x680/0x680 [ 1763.040246] ? dns_resolver_free_preparse+0x40/0x40 [ 1763.040865] ? assoc_array_cancel_edit+0x90/0x90 [ 1763.041449] ? down_write+0xe0/0x160 [ 1763.041908] ? down_write_killable+0x180/0x180 [ 1763.042473] ? key_free_user_ns+0x130/0x130 [ 1763.043013] __key_link_begin+0xec/0x250 [ 1763.043524] key_create_or_update+0x468/0xc30 [ 1763.044082] ? key_alloc+0x1280/0x1280 [ 1763.044559] ? join_session_keyring+0x350/0x350 [ 1763.045135] ? exc_page_fault+0xca/0x1a0 [ 1763.045653] ? copy_user_generic_string+0x2c/0x40 [ 1763.046252] __do_sys_add_key+0x215/0x430 [ 1763.046765] ? __do_sys_request_key+0x3b0/0x3b0 [ 1763.047354] ? ksys_write+0x1a9/0x260 [ 1763.047781] FAULT_INJECTION: forcing a failure. [ 1763.047781] name failslab, interval 1, probability 0, space 0, times 0 [ 1763.047819] ? __ia32_sys_read+0xb0/0xb0 [ 1763.047840] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1763.051204] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1763.051840] do_syscall_64+0x33/0x40 [ 1763.052303] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1763.052931] RIP: 0033:0x7f4453ef4b19 [ 1763.053383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1763.055638] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1763.056572] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1763.057441] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1763.058317] RBP: 00007f445146a1d0 R08: 0000000019841d10 R09: 0000000000000000 [ 1763.059190] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1763.060072] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 [ 1763.060969] CPU: 0 PID: 9567 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1763.062396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1763.064138] Call Trace: [ 1763.064691] dump_stack+0x107/0x167 [ 1763.065455] should_fail.cold+0x5/0xa [ 1763.066257] should_failslab+0x5/0x20 [ 1763.067050] __kmalloc_track_caller+0x79/0x370 [ 1763.068008] ? key_alloc+0x42f/0x1280 [ 1763.068816] kmemdup+0x23/0x50 [ 1763.069475] key_alloc+0x42f/0x1280 [ 1763.070244] ? key_user_lookup+0x560/0x560 [ 1763.071115] key_create_or_update+0x6c3/0xc30 [ 1763.072065] ? key_alloc+0x1280/0x1280 [ 1763.072840] ? join_session_keyring+0x350/0x350 [ 1763.073802] ? exc_page_fault+0xca/0x1a0 [ 1763.074646] ? copy_user_generic_string+0x2c/0x40 [ 1763.075661] __do_sys_add_key+0x215/0x430 [ 1763.076503] ? __do_sys_request_key+0x3b0/0x3b0 [ 1763.077458] ? ksys_write+0x1a9/0x260 [ 1763.078223] ? __ia32_sys_read+0xb0/0xb0 [ 1763.079062] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1763.080120] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1763.081186] do_syscall_64+0x33/0x40 [ 1763.081933] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1763.082987] RIP: 0033:0x7f6afab3cb19 [ 1763.083750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1763.087497] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1763.087614] Process accounting resumed [ 1763.089012] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1763.089023] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1763.089034] RBP: 00007f6af80b21d0 R08: 000000001eb0ca6d R09: 0000000000000000 [ 1763.089047] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1763.095237] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:21:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:21:07 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:21:07 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:07 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 11) 12:21:07 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:21:07 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 17) 12:21:07 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:07 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) [ 1763.215161] FAULT_INJECTION: forcing a failure. [ 1763.215161] name failslab, interval 1, probability 0, space 0, times 0 [ 1763.216427] CPU: 1 PID: 9586 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1763.217178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1763.218038] Call Trace: [ 1763.218333] dump_stack+0x107/0x167 [ 1763.218721] should_fail.cold+0x5/0xa [ 1763.219136] ? create_object.isra.0+0x3a/0xa20 [ 1763.219632] should_failslab+0x5/0x20 [ 1763.220048] kmem_cache_alloc+0x5b/0x310 [ 1763.220480] create_object.isra.0+0x3a/0xa20 [ 1763.220959] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1763.221494] __kmalloc_track_caller+0x177/0x370 [ 1763.222005] ? key_alloc+0x42f/0x1280 [ 1763.222416] kmemdup+0x23/0x50 [ 1763.222774] key_alloc+0x42f/0x1280 [ 1763.223162] ? key_user_lookup+0x560/0x560 [ 1763.223648] key_create_or_update+0x6c3/0xc30 [ 1763.224103] ? key_alloc+0x1280/0x1280 [ 1763.224545] ? join_session_keyring+0x350/0x350 [ 1763.225038] ? exc_page_fault+0xca/0x1a0 [ 1763.225514] ? copy_user_generic_string+0x2c/0x40 [ 1763.226015] __do_sys_add_key+0x215/0x430 [ 1763.226480] ? __do_sys_request_key+0x3b0/0x3b0 [ 1763.226968] ? ksys_write+0x1a9/0x260 [ 1763.227401] ? __ia32_sys_read+0xb0/0xb0 [ 1763.227827] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1763.228408] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1763.228728] FAULT_INJECTION: forcing a failure. [ 1763.228728] name failslab, interval 1, probability 0, space 0, times 0 [ 1763.228950] do_syscall_64+0x33/0x40 [ 1763.231680] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1763.232212] RIP: 0033:0x7f6afab3cb19 [ 1763.232601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1763.234491] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1763.235278] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1763.236019] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1763.236756] RBP: 00007f6af80b21d0 R08: 0000000036d13387 R09: 0000000000000000 [ 1763.237495] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1763.238229] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 [ 1763.238991] CPU: 0 PID: 9583 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1763.240454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1763.242204] Call Trace: [ 1763.242770] dump_stack+0x107/0x167 [ 1763.243554] should_fail.cold+0x5/0xa [ 1763.244364] ? create_object.isra.0+0x3a/0xa20 [ 1763.245333] should_failslab+0x5/0x20 [ 1763.246136] kmem_cache_alloc+0x5b/0x310 [ 1763.247009] create_object.isra.0+0x3a/0xa20 [ 1763.247952] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1763.249032] kmem_cache_alloc_trace+0x151/0x320 [ 1763.250026] assoc_array_insert+0xde/0x2aa0 [ 1763.250944] ? lock_release+0x680/0x680 [ 1763.251812] ? dns_resolver_preparse+0x60e/0x8b0 [ 1763.252815] ? lock_release+0x680/0x680 [ 1763.253667] ? dns_resolver_free_preparse+0x40/0x40 [ 1763.254725] ? assoc_array_cancel_edit+0x90/0x90 [ 1763.255744] ? down_write+0xe0/0x160 [ 1763.256534] ? down_write_killable+0x180/0x180 [ 1763.257504] ? key_free_user_ns+0x130/0x130 [ 1763.258428] __key_link_begin+0xec/0x250 [ 1763.259302] key_create_or_update+0x468/0xc30 [ 1763.260271] ? key_alloc+0x1280/0x1280 [ 1763.261094] ? join_session_keyring+0x350/0x350 [ 1763.262079] ? exc_page_fault+0xca/0x1a0 [ 1763.262964] ? copy_user_generic_string+0x2c/0x40 [ 1763.264007] __do_sys_add_key+0x215/0x430 [ 1763.264888] ? __do_sys_request_key+0x3b0/0x3b0 [ 1763.265866] ? ksys_write+0x1a9/0x260 [ 1763.266671] ? __ia32_sys_read+0xb0/0xb0 [ 1763.267545] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1763.268651] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1763.269748] do_syscall_64+0x33/0x40 [ 1763.270536] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1763.271635] RIP: 0033:0x7f4453ef4b19 [ 1763.272424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1763.276308] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1763.277915] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1763.279430] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1763.280937] RBP: 00007f445146a1d0 R08: 00000000148ce0c4 R09: 0000000000000000 [ 1763.282441] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1763.283963] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:21:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:21:07 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:21:07 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 18) 12:21:07 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:07 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:21:07 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:21:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) [ 1763.387266] FAULT_INJECTION: forcing a failure. [ 1763.387266] name failslab, interval 1, probability 0, space 0, times 0 [ 1763.390063] CPU: 0 PID: 9593 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1763.391839] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1763.393664] Call Trace: [ 1763.394358] dump_stack+0x107/0x167 [ 1763.395175] should_fail.cold+0x5/0xa [ 1763.396045] ? selinux_key_alloc+0x46/0x1b0 [ 1763.397011] should_failslab+0x5/0x20 [ 1763.397859] kmem_cache_alloc_trace+0x55/0x320 [ 1763.398881] selinux_key_alloc+0x46/0x1b0 [ 1763.399817] security_key_alloc+0x56/0xb0 [ 1763.400738] key_alloc+0x8a3/0x1280 [ 1763.401572] ? key_user_lookup+0x560/0x560 [ 1763.402532] key_create_or_update+0x6c3/0xc30 [ 1763.403572] ? key_alloc+0x1280/0x1280 [ 1763.404436] ? join_session_keyring+0x350/0x350 [ 1763.405473] ? exc_page_fault+0xca/0x1a0 [ 1763.406415] ? copy_user_generic_string+0x2c/0x40 [ 1763.407508] __do_sys_add_key+0x215/0x430 [ 1763.408430] ? __do_sys_request_key+0x3b0/0x3b0 [ 1763.409462] ? ksys_write+0x1a9/0x260 [ 1763.410305] ? __ia32_sys_read+0xb0/0xb0 [ 1763.411211] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1763.412379] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1763.413536] do_syscall_64+0x33/0x40 [ 1763.414361] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1763.415510] RIP: 0033:0x7f6afab3cb19 [ 1763.416335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1763.420381] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1763.422068] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1763.423650] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1763.425212] RBP: 00007f6af80b21d0 R08: 0000000016972ebc R09: 0000000000000000 [ 1763.426784] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1763.428376] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:21:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:21:07 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:07 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:07 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:21 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 12) 12:21:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:21:21 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 19) 12:21:21 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:21:21 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:21 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:21 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) [ 1776.934822] FAULT_INJECTION: forcing a failure. [ 1776.934822] name failslab, interval 1, probability 0, space 0, times 0 [ 1776.937285] CPU: 1 PID: 9621 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1776.938670] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1776.940370] Call Trace: [ 1776.940917] dump_stack+0x107/0x167 [ 1776.941665] should_fail.cold+0x5/0xa [ 1776.942446] ? create_object.isra.0+0x3a/0xa20 [ 1776.943379] should_failslab+0x5/0x20 [ 1776.944180] kmem_cache_alloc+0x5b/0x310 [ 1776.945016] create_object.isra.0+0x3a/0xa20 [ 1776.945909] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1776.946948] kmem_cache_alloc_trace+0x151/0x320 [ 1776.947911] selinux_key_alloc+0x46/0x1b0 [ 1776.948753] security_key_alloc+0x56/0xb0 [ 1776.949599] key_alloc+0x8a3/0x1280 [ 1776.950356] ? key_user_lookup+0x560/0x560 [ 1776.950733] FAULT_INJECTION: forcing a failure. [ 1776.950733] name failslab, interval 1, probability 0, space 0, times 0 [ 1776.951227] key_create_or_update+0x6c3/0xc30 [ 1776.954354] ? key_alloc+0x1280/0x1280 [ 1776.955158] ? join_session_keyring+0x350/0x350 [ 1776.956111] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1776.957215] ? copy_user_generic_string+0x2c/0x40 [ 1776.958201] __do_sys_add_key+0x215/0x430 [ 1776.959051] ? __do_sys_request_key+0x3b0/0x3b0 [ 1776.959996] ? ksys_write+0x1a9/0x260 [ 1776.960774] ? __ia32_sys_read+0xb0/0xb0 [ 1776.961606] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1776.962668] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1776.963734] do_syscall_64+0x33/0x40 [ 1776.964492] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1776.965532] RIP: 0033:0x7f6afab3cb19 [ 1776.966285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1776.969998] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1776.971548] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19 [ 1776.972988] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1776.974438] RBP: 00007f6af80b21d0 R08: 000000000eb09bd0 R09: 0000000000000000 [ 1776.975895] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1776.977335] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 [ 1776.978826] CPU: 0 PID: 9631 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1776.980233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1776.981918] Call Trace: [ 1776.982460] dump_stack+0x107/0x167 [ 1776.983203] should_fail.cold+0x5/0xa [ 1776.984013] ? assoc_array_insert+0x73f/0x2aa0 [ 1776.984944] should_failslab+0x5/0x20 [ 1776.985730] kmem_cache_alloc_trace+0x55/0x320 [ 1776.986662] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1776.987726] assoc_array_insert+0x73f/0x2aa0 [ 1776.988623] ? lock_release+0x680/0x680 [ 1776.989436] ? dns_resolver_preparse+0x60e/0x8b0 [ 1776.990395] ? lock_release+0x680/0x680 [ 1776.991216] ? dns_resolver_free_preparse+0x40/0x40 [ 1776.992236] ? assoc_array_cancel_edit+0x90/0x90 [ 1776.993203] ? down_write+0xe0/0x160 [ 1776.993958] ? down_write_killable+0x180/0x180 [ 1776.994884] ? key_free_user_ns+0x130/0x130 [ 1776.995782] __key_link_begin+0xec/0x250 [ 1776.996609] key_create_or_update+0x468/0xc30 [ 1776.997526] ? key_alloc+0x1280/0x1280 [ 1776.998316] ? join_session_keyring+0x350/0x350 [ 1776.999260] ? exc_page_fault+0xca/0x1a0 [ 1777.000122] ? copy_user_generic_string+0x2c/0x40 [ 1777.001114] __do_sys_add_key+0x215/0x430 [ 1777.001960] ? __do_sys_request_key+0x3b0/0x3b0 [ 1777.002902] ? ksys_write+0x1a9/0x260 [ 1777.003680] ? __ia32_sys_read+0xb0/0xb0 [ 1777.004507] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1777.005569] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1777.006617] do_syscall_64+0x33/0x40 [ 1777.007372] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1777.008420] RIP: 0033:0x7f4453ef4b19 12:21:21 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1777.009178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1777.013039] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1777.014580] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1777.016050] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1777.017487] RBP: 00007f445146a1d0 R08: 0000000017972fde R09: 0000000000000000 [ 1777.018934] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1777.020380] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:21:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:21:21 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:21 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:21:21 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:21 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:21:34 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 13) 12:21:34 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:34 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 20) 12:21:34 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:21:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:21:34 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:21:34 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) [ 1790.269911] FAULT_INJECTION: forcing a failure. [ 1790.269911] name failslab, interval 1, probability 0, space 0, times 0 [ 1790.272299] CPU: 1 PID: 9654 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1790.273702] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1790.275422] Call Trace: [ 1790.275977] dump_stack+0x107/0x167 [ 1790.276743] should_fail.cold+0x5/0xa [ 1790.277530] ? create_object.isra.0+0x3a/0xa20 [ 1790.278479] should_failslab+0x5/0x20 [ 1790.279284] kmem_cache_alloc+0x5b/0x310 [ 1790.280143] ? mark_held_locks+0x9e/0xe0 [ 1790.280989] create_object.isra.0+0x3a/0xa20 [ 1790.281898] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1790.282949] kmem_cache_alloc_trace+0x151/0x320 [ 1790.283929] assoc_array_insert+0x73f/0x2aa0 [ 1790.284842] ? lock_release+0x680/0x680 [ 1790.285668] ? dns_resolver_preparse+0x60e/0x8b0 [ 1790.286640] ? lock_release+0x680/0x680 [ 1790.287467] ? dns_resolver_free_preparse+0x40/0x40 [ 1790.288488] ? assoc_array_cancel_edit+0x90/0x90 [ 1790.289471] ? down_write+0xe0/0x160 [ 1790.290236] ? down_write_killable+0x180/0x180 [ 1790.291177] ? key_free_user_ns+0x130/0x130 [ 1790.292092] __key_link_begin+0xec/0x250 [ 1790.292932] key_create_or_update+0x468/0xc30 [ 1790.293861] ? key_alloc+0x1280/0x1280 [ 1790.294662] ? join_session_keyring+0x350/0x350 [ 1790.295622] ? exc_page_fault+0xca/0x1a0 [ 1790.296492] ? copy_user_generic_string+0x2c/0x40 [ 1790.297495] __do_sys_add_key+0x215/0x430 [ 1790.298353] ? __do_sys_request_key+0x3b0/0x3b0 [ 1790.299309] ? ksys_write+0x1a9/0x260 [ 1790.300102] ? __ia32_sys_read+0xb0/0xb0 [ 1790.300944] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1790.302021] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1790.303086] do_syscall_64+0x33/0x40 [ 1790.303874] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1790.304929] RIP: 0033:0x7f4453ef4b19 [ 1790.305695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1790.309470] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1790.311034] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1790.312507] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1790.313969] RBP: 00007f445146a1d0 R08: 0000000000647e05 R09: 0000000000000000 [ 1790.315432] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1790.316912] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:21:34 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) [ 1790.328448] FAULT_INJECTION: forcing a failure. [ 1790.328448] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1790.330967] CPU: 1 PID: 9657 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1790.332384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1790.334088] Call Trace: [ 1790.334647] dump_stack+0x107/0x167 [ 1790.335405] should_fail.cold+0x5/0xa [ 1790.336233] _copy_to_user+0x2e/0x180 [ 1790.337026] simple_read_from_buffer+0xcc/0x160 [ 1790.337988] proc_fail_nth_read+0x198/0x230 [ 1790.338914] ? proc_sessionid_read+0x230/0x230 [ 1790.339867] ? security_file_permission+0x24e/0x570 [ 1790.340897] ? perf_trace_initcall_start+0x101/0x380 [ 1790.341951] ? proc_sessionid_read+0x230/0x230 [ 1790.342888] vfs_read+0x228/0x580 [ 1790.343608] ksys_read+0x12d/0x260 [ 1790.344346] ? vfs_write+0xa70/0xa70 [ 1790.345119] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1790.346212] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1790.347285] do_syscall_64+0x33/0x40 [ 1790.348071] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1790.349136] RIP: 0033:0x7f6afaaef69c [ 1790.349904] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1790.353710] RSP: 002b:00007f6af80b2170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1790.355284] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f6afaaef69c [ 1790.356766] RDX: 000000000000000f RSI: 00007f6af80b21e0 RDI: 0000000000000003 [ 1790.358230] RBP: 00007f6af80b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1790.359712] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1790.361179] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000 12:21:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:21:34 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:34 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 14) 12:21:34 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:21:34 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2) 12:21:34 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1790.511012] FAULT_INJECTION: forcing a failure. [ 1790.511012] name failslab, interval 1, probability 0, space 0, times 0 [ 1790.512820] CPU: 1 PID: 9682 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1790.513853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1790.515121] Call Trace: [ 1790.515520] dump_stack+0x107/0x167 [ 1790.516097] should_fail.cold+0x5/0xa [ 1790.516668] ? key_alloc+0x3d1/0x1280 [ 1790.517249] should_failslab+0x5/0x20 [ 1790.517825] kmem_cache_alloc+0x5b/0x310 [ 1790.518453] key_alloc+0x3d1/0x1280 [ 1790.519016] ? key_user_lookup+0x560/0x560 [ 1790.519695] key_create_or_update+0x6c3/0xc30 [ 1790.520382] ? key_alloc+0x1280/0x1280 [ 1790.520968] ? join_session_keyring+0x350/0x350 [ 1790.521688] ? exc_page_fault+0xca/0x1a0 [ 1790.522335] ? copy_user_generic_string+0x2c/0x40 [ 1790.523093] __do_sys_add_key+0x215/0x430 [ 1790.523733] ? __do_sys_request_key+0x3b0/0x3b0 [ 1790.524435] ? ksys_write+0x1a9/0x260 [ 1790.525011] ? __ia32_sys_read+0xb0/0xb0 [ 1790.525632] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1790.526420] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1790.527194] do_syscall_64+0x33/0x40 [ 1790.527768] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1790.528555] RIP: 0033:0x7f4453ef4b19 [ 1790.529121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1790.531836] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1790.532987] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1790.534073] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1790.535154] RBP: 00007f445146a1d0 R08: 00000000240f359d R09: 0000000000000000 [ 1790.536266] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1790.537339] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:21:50 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:21:50 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:50 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 15) 12:21:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:21:50 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2) 12:21:50 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x7c, 0x2) 12:21:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:21:50 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1806.550795] FAULT_INJECTION: forcing a failure. [ 1806.550795] name failslab, interval 1, probability 0, space 0, times 0 [ 1806.553272] CPU: 0 PID: 9695 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1806.554698] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1806.556466] Call Trace: [ 1806.557033] dump_stack+0x107/0x167 [ 1806.557809] should_fail.cold+0x5/0xa [ 1806.558613] ? create_object.isra.0+0x3a/0xa20 [ 1806.559580] should_failslab+0x5/0x20 [ 1806.560396] kmem_cache_alloc+0x5b/0x310 [ 1806.561272] create_object.isra.0+0x3a/0xa20 [ 1806.562215] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1806.563313] kmem_cache_alloc+0x159/0x310 [ 1806.564289] key_alloc+0x3d1/0x1280 12:21:50 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1806.565087] ? key_user_lookup+0x560/0x560 [ 1806.566124] key_create_or_update+0x6c3/0xc30 [ 1806.567108] ? key_alloc+0x1280/0x1280 [ 1806.568013] ? join_session_keyring+0x350/0x350 [ 1806.569008] ? exc_page_fault+0xca/0x1a0 [ 1806.569901] ? copy_user_generic_string+0x2c/0x40 [ 1806.570938] __do_sys_add_key+0x215/0x430 [ 1806.571823] ? __do_sys_request_key+0x3b0/0x3b0 [ 1806.572821] ? ksys_write+0x1a9/0x260 [ 1806.573630] ? __ia32_sys_read+0xb0/0xb0 [ 1806.574521] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1806.575643] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1806.576769] do_syscall_64+0x33/0x40 [ 1806.577566] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1806.578658] RIP: 0033:0x7f4453ef4b19 [ 1806.579457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1806.583237] Process accounting paused [ 1806.583379] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1806.583409] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1806.587211] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1806.588743] RBP: 00007f445146a1d0 R08: 000000001a160467 R09: 0000000000000000 [ 1806.590248] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1806.591762] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:22:07 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2) 12:22:07 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 16) 12:22:07 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:22:07 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2) 12:22:07 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:22:07 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:22:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:22:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) [ 1822.955110] FAULT_INJECTION: forcing a failure. [ 1822.955110] name failslab, interval 1, probability 0, space 0, times 0 [ 1822.957599] CPU: 1 PID: 9722 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1822.958996] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1822.960730] Call Trace: [ 1822.961273] dump_stack+0x107/0x167 [ 1822.962020] should_fail.cold+0x5/0xa [ 1822.962808] should_failslab+0x5/0x20 [ 1822.963579] __kmalloc_track_caller+0x79/0x370 [ 1822.964510] ? key_alloc+0x42f/0x1280 [ 1822.965294] kmemdup+0x23/0x50 [ 1822.965948] key_alloc+0x42f/0x1280 [ 1822.966709] ? key_user_lookup+0x560/0x560 [ 1822.967586] key_create_or_update+0x6c3/0xc30 [ 1822.968553] ? key_alloc+0x1280/0x1280 [ 1822.969359] ? join_session_keyring+0x350/0x350 [ 1822.970314] ? exc_page_fault+0xca/0x1a0 [ 1822.971160] ? copy_user_generic_string+0x2c/0x40 [ 1822.972170] __do_sys_add_key+0x215/0x430 [ 1822.973012] ? __do_sys_request_key+0x3b0/0x3b0 [ 1822.973952] ? ksys_write+0x1a9/0x260 [ 1822.974726] ? __ia32_sys_read+0xb0/0xb0 [ 1822.975558] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1822.976631] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1822.977677] do_syscall_64+0x33/0x40 [ 1822.978451] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1822.979487] RIP: 0033:0x7f4453ef4b19 [ 1822.980269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1822.983974] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1822.985517] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1822.986955] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1822.988406] RBP: 00007f445146a1d0 R08: 0000000012305f7b R09: 0000000000000000 [ 1822.989832] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1822.991256] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:22:07 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:22:07 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:22:07 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:22:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:22:07 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 17) 12:22:07 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1823.174480] FAULT_INJECTION: forcing a failure. [ 1823.174480] name failslab, interval 1, probability 0, space 0, times 0 [ 1823.176961] CPU: 0 PID: 9736 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1823.178437] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1823.180244] Call Trace: [ 1823.180822] dump_stack+0x107/0x167 [ 1823.181618] should_fail.cold+0x5/0xa [ 1823.182451] ? create_object.isra.0+0x3a/0xa20 [ 1823.183444] should_failslab+0x5/0x20 [ 1823.184279] kmem_cache_alloc+0x5b/0x310 [ 1823.185172] create_object.isra.0+0x3a/0xa20 [ 1823.186121] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1823.187224] __kmalloc_track_caller+0x177/0x370 [ 1823.188270] ? key_alloc+0x42f/0x1280 [ 1823.189097] kmemdup+0x23/0x50 [ 1823.189810] key_alloc+0x42f/0x1280 [ 1823.190610] ? key_user_lookup+0x560/0x560 [ 1823.191559] key_create_or_update+0x6c3/0xc30 [ 1823.192531] ? key_alloc+0x1280/0x1280 [ 1823.193361] ? join_session_keyring+0x350/0x350 [ 1823.194379] ? exc_page_fault+0xca/0x1a0 [ 1823.195273] ? copy_user_generic_string+0x2c/0x40 [ 1823.196338] __do_sys_add_key+0x215/0x430 [ 1823.197243] ? __do_sys_request_key+0x3b0/0x3b0 [ 1823.198247] ? ksys_write+0x1a9/0x260 [ 1823.199078] ? __ia32_sys_read+0xb0/0xb0 [ 1823.199971] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1823.201134] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1823.202265] do_syscall_64+0x33/0x40 [ 1823.203069] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1823.204192] RIP: 0033:0x7f4453ef4b19 [ 1823.205000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1823.208975] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1823.210603] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1823.212133] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1823.213656] RBP: 00007f445146a1d0 R08: 000000003b3c87a0 R09: 0000000000000000 [ 1823.215189] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1823.216745] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:22:07 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x3}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:22:07 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x0) 12:22:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:22:07 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:22:07 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 18) 12:22:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) [ 1823.450746] FAULT_INJECTION: forcing a failure. [ 1823.450746] name failslab, interval 1, probability 0, space 0, times 0 [ 1823.453458] CPU: 0 PID: 9751 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1823.454920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1823.456731] Call Trace: [ 1823.457304] dump_stack+0x107/0x167 [ 1823.458102] should_fail.cold+0x5/0xa [ 1823.458923] ? selinux_key_alloc+0x46/0x1b0 [ 1823.459881] should_failslab+0x5/0x20 [ 1823.460724] kmem_cache_alloc_trace+0x55/0x320 [ 1823.461713] selinux_key_alloc+0x46/0x1b0 [ 1823.462626] security_key_alloc+0x56/0xb0 [ 1823.463540] key_alloc+0x8a3/0x1280 [ 1823.464371] ? key_user_lookup+0x560/0x560 [ 1823.465305] key_create_or_update+0x6c3/0xc30 [ 1823.466290] ? key_alloc+0x1280/0x1280 [ 1823.467124] ? join_session_keyring+0x350/0x350 [ 1823.468160] ? exc_page_fault+0xca/0x1a0 [ 1823.469068] ? copy_user_generic_string+0x2c/0x40 [ 1823.470134] __do_sys_add_key+0x215/0x430 [ 1823.471042] ? __do_sys_request_key+0x3b0/0x3b0 [ 1823.472059] ? ksys_write+0x1a9/0x260 [ 1823.472899] ? __ia32_sys_read+0xb0/0xb0 [ 1823.473791] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1823.474933] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1823.476064] do_syscall_64+0x33/0x40 [ 1823.476882] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1823.477999] RIP: 0033:0x7f4453ef4b19 [ 1823.478793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1823.482726] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1823.484376] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1823.485924] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1823.487468] RBP: 00007f445146a1d0 R08: 000000001a7b4175 R09: 0000000000000000 [ 1823.489031] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1823.490568] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:22:21 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:22:21 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:22:21 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 19) 12:22:21 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:22:21 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x65}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:22:21 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x0) 12:22:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2) 12:22:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) [ 1837.095622] Process accounting resumed [ 1837.117932] FAULT_INJECTION: forcing a failure. [ 1837.117932] name failslab, interval 1, probability 0, space 0, times 0 12:22:21 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a404c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) [ 1837.120463] CPU: 0 PID: 9768 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1837.121953] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1837.123633] Call Trace: [ 1837.124181] dump_stack+0x107/0x167 [ 1837.124932] should_fail.cold+0x5/0xa [ 1837.125716] ? create_object.isra.0+0x3a/0xa20 [ 1837.126661] should_failslab+0x5/0x20 [ 1837.127425] kmem_cache_alloc+0x5b/0x310 [ 1837.128272] create_object.isra.0+0x3a/0xa20 [ 1837.129168] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1837.130218] kmem_cache_alloc_trace+0x151/0x320 [ 1837.131180] selinux_key_alloc+0x46/0x1b0 [ 1837.132032] security_key_alloc+0x56/0xb0 [ 1837.132895] key_alloc+0x8a3/0x1280 [ 1837.133652] ? key_user_lookup+0x560/0x560 [ 1837.134523] key_create_or_update+0x6c3/0xc30 [ 1837.135430] ? key_alloc+0x1280/0x1280 [ 1837.136213] ? join_session_keyring+0x350/0x350 [ 1837.137174] ? exc_page_fault+0xca/0x1a0 [ 1837.138024] ? copy_user_generic_string+0x2c/0x40 [ 1837.139040] __do_sys_add_key+0x215/0x430 [ 1837.139892] ? __do_sys_request_key+0x3b0/0x3b0 [ 1837.140875] ? ksys_write+0x1a9/0x260 [ 1837.141657] ? __ia32_sys_read+0xb0/0xb0 [ 1837.142509] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1837.143577] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1837.144679] do_syscall_64+0x33/0x40 [ 1837.145440] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1837.146507] RIP: 0033:0x7f4453ef4b19 [ 1837.147266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1837.150956] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1837.152513] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19 [ 1837.153938] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0 [ 1837.155372] RBP: 00007f445146a1d0 R08: 0000000024190d9b R09: 0000000000000000 [ 1837.156795] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1837.158253] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:22:34 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:22:34 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:22:34 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x0) 12:22:34 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:22:34 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 20) 12:22:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:22:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:22:34 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a410c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) [ 1849.889739] FAULT_INJECTION: forcing a failure. [ 1849.889739] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1849.892105] CPU: 0 PID: 9790 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1849.893502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1849.895150] Call Trace: [ 1849.895697] dump_stack+0x107/0x167 [ 1849.896449] should_fail.cold+0x5/0xa [ 1849.897247] _copy_to_user+0x2e/0x180 [ 1849.898019] simple_read_from_buffer+0xcc/0x160 [ 1849.898972] proc_fail_nth_read+0x198/0x230 [ 1849.899833] ? proc_sessionid_read+0x230/0x230 [ 1849.900773] ? security_file_permission+0x24e/0x570 [ 1849.901757] ? perf_trace_initcall_start+0x101/0x380 [ 1849.902798] ? proc_sessionid_read+0x230/0x230 [ 1849.903710] vfs_read+0x228/0x580 [ 1849.904424] ksys_read+0x12d/0x260 [ 1849.905155] ? vfs_write+0xa70/0xa70 [ 1849.905928] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1849.906970] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1849.908022] do_syscall_64+0x33/0x40 [ 1849.908767] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1849.909806] RIP: 0033:0x7f4453ea769c [ 1849.910540] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1849.914302] RSP: 002b:00007f445146a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1849.915820] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f4453ea769c [ 1849.917294] RDX: 000000000000000f RSI: 00007f445146a1e0 RDI: 0000000000000003 [ 1849.918738] RBP: 00007f445146a1d0 R08: 0000000000000000 R09: 0000000000000000 12:22:34 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1849.920183] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002 [ 1849.921755] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000 12:22:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:22:34 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2) 12:22:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:22:34 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7027255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:22:34 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:22:34 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:22:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:22:34 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:22:49 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7047255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:22:49 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:22:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) 12:22:49 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:22:49 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:22:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:22:49 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2) 12:22:49 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:22:49 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:22:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:22:49 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7057255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:22:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}]}, 0x64, 0x2) 12:22:49 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:22:49 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2) 12:22:49 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7067255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:22:49 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fow', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:22:49 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:22:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:22:49 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:22:49 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x3}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:03 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x65}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:03 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fow', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}]}, 0x64, 0x2) 12:23:03 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:23:03 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:23:03 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7077255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:23:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:23:03 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a410c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) [ 1879.527104] Process accounting paused 12:23:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}]}, 0x64, 0x2) 12:23:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:23:17 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fow', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:23:17 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab70a7255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:17 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:17 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7027255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:17 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:23:17 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:17 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7047255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:17 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7107255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:23:18 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:23:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:23:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x0) 12:23:18 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:18 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowne', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:18 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7057255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:18 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db441000824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:18 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440502824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:23:18 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7067255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:23:18 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:23:18 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2) 12:23:32 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440503824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:23:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x0) 12:23:32 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2) 12:23:32 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7077255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:32 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:23:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:23:32 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowne', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:48 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440565824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:48 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:23:48 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x4c, 0x2) 12:23:48 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab70a7255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x0) 12:23:48 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2) 12:23:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:23:48 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowne', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:48 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:48 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824002767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:23:48 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7107255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:48 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x4c, 0x2) [ 1924.311987] Process accounting resumed 12:23:48 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:23:48 executing program 0: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:48 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x4c, 0x2) 12:23:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:23:48 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824003767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:23:48 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:23:48 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db441000824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:10 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}}, 0x4c, 0x2) 12:24:10 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:10 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:10 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440502824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:24:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:24:10 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824004767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:10 executing program 0: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowne', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:10 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:24:10 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440503824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:10 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824010767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:24:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:24:27 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:24:27 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440565824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:24:27 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2) (fail_nth: 1) 12:24:27 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 1) 12:24:27 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269020f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:27 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}}, 0x4c, 0x2) [ 1963.218927] FAULT_INJECTION: forcing a failure. [ 1963.218927] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1963.221419] CPU: 1 PID: 10081 Comm: syz-executor.0 Not tainted 5.10.184 #1 [ 1963.222828] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1963.224518] Call Trace: [ 1963.225068] dump_stack+0x107/0x167 [ 1963.225812] should_fail.cold+0x5/0xa [ 1963.226608] strncpy_from_user+0x34/0x470 [ 1963.227457] setxattr+0xc8/0x330 [ 1963.228150] ? vfs_setxattr+0x270/0x270 [ 1963.228954] ? find_held_lock+0x2c/0x110 [ 1963.229783] ? lock_acquire+0x197/0x470 [ 1963.230633] ? __x64_sys_fsetxattr+0x176/0x290 [ 1963.231567] ? lock_release+0x680/0x680 [ 1963.232385] ? __fget_files+0x296/0x4c0 [ 1963.233209] ? __mnt_want_write+0x196/0x280 [ 1963.234106] __x64_sys_fsetxattr+0x1f9/0x290 [ 1963.235041] do_syscall_64+0x33/0x40 [ 1963.235805] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1963.236862] RIP: 0033:0x7f0e44587b19 [ 1963.237616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1963.241337] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1963.242877] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19 [ 1963.244311] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 1963.245754] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000 [ 1963.247196] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001 [ 1963.248631] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000 12:24:27 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269030f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:27 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}}, 0x4c, 0x2) 12:24:27 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) [ 1963.333340] FAULT_INJECTION: forcing a failure. [ 1963.333340] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1963.336911] CPU: 1 PID: 10082 Comm: syz-executor.1 Not tainted 5.10.184 #1 [ 1963.338332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1963.340022] Call Trace: [ 1963.340604] dump_stack+0x107/0x167 [ 1963.341349] should_fail.cold+0x5/0xa [ 1963.342131] strncpy_from_user+0x34/0x470 [ 1963.342985] setxattr+0xc8/0x330 [ 1963.343674] ? vfs_setxattr+0x270/0x270 [ 1963.344482] ? find_held_lock+0x2c/0x110 [ 1963.345313] ? lock_acquire+0x197/0x470 [ 1963.346124] ? __x64_sys_fsetxattr+0x176/0x290 [ 1963.347050] ? lock_release+0x680/0x680 [ 1963.347853] ? __fget_files+0x296/0x4c0 [ 1963.348661] ? __mnt_want_write+0x196/0x280 [ 1963.349545] __x64_sys_fsetxattr+0x1f9/0x290 [ 1963.350457] do_syscall_64+0x33/0x40 [ 1963.351207] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1963.352238] RIP: 0033:0x7f1be77ddb19 [ 1963.352989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1963.356724] RSP: 002b:00007f1be4d53188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1963.358277] RAX: ffffffffffffffda RBX: 00007f1be78f0f60 RCX: 00007f1be77ddb19 [ 1963.359731] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 1963.361181] RBP: 00007f1be4d531d0 R08: 0000000000000002 R09: 0000000000000000 [ 1963.362643] R10: 000000000000007c R11: 0000000000000246 R12: 0000000000000001 [ 1963.364074] R13: 00007ffea2f7189f R14: 00007f1be4d53300 R15: 0000000000022000 12:24:27 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824002767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:27 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x0, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 2) 12:24:27 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269040f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:27 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) [ 1963.485539] FAULT_INJECTION: forcing a failure. [ 1963.485539] name failslab, interval 1, probability 0, space 0, times 0 [ 1963.488115] CPU: 1 PID: 10096 Comm: syz-executor.0 Not tainted 5.10.184 #1 [ 1963.489652] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1963.491420] Call Trace: [ 1963.491985] dump_stack+0x107/0x167 [ 1963.492757] should_fail.cold+0x5/0xa [ 1963.493616] ? kvmalloc_node+0x119/0x170 [ 1963.494487] should_failslab+0x5/0x20 [ 1963.495315] __kmalloc_node+0x76/0x420 [ 1963.496135] kvmalloc_node+0x119/0x170 [ 1963.496991] setxattr+0x14e/0x330 [ 1963.497723] ? vfs_setxattr+0x270/0x270 [ 1963.498609] ? find_held_lock+0x2c/0x110 [ 1963.499470] ? lock_acquire+0x197/0x470 [ 1963.500339] ? __x64_sys_fsetxattr+0x176/0x290 [ 1963.501297] ? lock_release+0x680/0x680 [ 1963.502180] ? __fget_files+0x296/0x4c0 [ 1963.503058] ? __mnt_want_write+0x196/0x280 [ 1963.504004] __x64_sys_fsetxattr+0x1f9/0x290 [ 1963.504970] do_syscall_64+0x33/0x40 [ 1963.505777] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1963.506898] RIP: 0033:0x7f0e44587b19 [ 1963.507696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1963.511643] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1963.513271] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19 [ 1963.514822] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 1963.516369] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000 [ 1963.517913] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001 [ 1963.519443] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000 12:24:27 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x0, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:27 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x0) [ 1963.625331] Process accounting paused 12:24:40 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824003767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:40 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2) (fail_nth: 2) 12:24:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 3) 12:24:40 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:40 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x0, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:24:40 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269100f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:40 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x0) (fail_nth: 1) [ 1976.549587] FAULT_INJECTION: forcing a failure. [ 1976.549587] name failslab, interval 1, probability 0, space 0, times 0 [ 1976.551976] CPU: 1 PID: 10129 Comm: syz-executor.0 Not tainted 5.10.184 #1 [ 1976.553397] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1976.555108] Call Trace: [ 1976.555663] dump_stack+0x107/0x167 [ 1976.556435] should_fail.cold+0x5/0xa [ 1976.557223] ? create_object.isra.0+0x3a/0xa20 [ 1976.558198] should_failslab+0x5/0x20 [ 1976.558975] kmem_cache_alloc+0x5b/0x310 [ 1976.559797] ? lock_downgrade+0x6d0/0x6d0 [ 1976.560662] create_object.isra.0+0x3a/0xa20 [ 1976.561572] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1976.562637] __kmalloc_node+0x1ae/0x420 [ 1976.563486] kvmalloc_node+0x119/0x170 [ 1976.564290] setxattr+0x14e/0x330 [ 1976.565021] ? vfs_setxattr+0x270/0x270 [ 1976.565847] ? find_held_lock+0x2c/0x110 [ 1976.566706] ? lock_acquire+0x197/0x470 [ 1976.567525] ? __x64_sys_fsetxattr+0x176/0x290 [ 1976.568466] ? lock_release+0x680/0x680 [ 1976.569282] ? __fget_files+0x296/0x4c0 [ 1976.570109] ? __mnt_want_write+0x196/0x280 [ 1976.571004] __x64_sys_fsetxattr+0x1f9/0x290 [ 1976.571907] do_syscall_64+0x33/0x40 [ 1976.572660] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1976.573700] RIP: 0033:0x7f0e44587b19 [ 1976.574478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1976.578266] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1976.579819] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19 [ 1976.581276] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 1976.582737] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000 [ 1976.584204] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001 [ 1976.585651] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000 12:24:40 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269011099ea715085731fa8ad0600", 0xfffff, r0) 12:24:40 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824004767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:40 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) [ 1976.669865] FAULT_INJECTION: forcing a failure. [ 1976.669865] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1976.675321] CPU: 1 PID: 10120 Comm: syz-executor.5 Not tainted 5.10.184 #1 [ 1976.676749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1976.678436] Call Trace: [ 1976.678982] dump_stack+0x107/0x167 [ 1976.679268] FAULT_INJECTION: forcing a failure. [ 1976.679268] name failslab, interval 1, probability 0, space 0, times 0 [ 1976.679731] should_fail.cold+0x5/0xa [ 1976.679760] strncpy_from_user+0x34/0x470 [ 1976.679785] setxattr+0xc8/0x330 [ 1976.679814] ? vfs_setxattr+0x270/0x270 [ 1976.685153] ? _raw_spin_unlock_irq+0x27/0x30 [ 1976.686103] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1976.687032] ? mark_held_locks+0x9e/0xe0 [ 1976.687869] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1976.688945] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1976.690048] ? trace_hardirqs_on+0x5b/0x180 [ 1976.691222] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1976.692534] ? mnt_want_write_file+0xfd/0x5f0 [ 1976.693597] ? __mnt_want_write+0x196/0x280 [ 1976.694671] __x64_sys_fsetxattr+0x1f9/0x290 [ 1976.695729] do_syscall_64+0x33/0x40 [ 1976.696619] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1976.697878] RIP: 0033:0x7f12f0a7bb19 [ 1976.698784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1976.703246] RSP: 002b:00007f12edff1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1976.705058] RAX: ffffffffffffffda RBX: 00007f12f0b8ef60 RCX: 00007f12f0a7bb19 [ 1976.706782] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 1976.708273] RBP: 00007f12edff11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1976.709738] R10: 000000000000004c R11: 0000000000000246 R12: 0000000000000001 [ 1976.711206] R13: 00007ffc9195868f R14: 00007f12edff1300 R15: 0000000000022000 [ 1976.712855] CPU: 0 PID: 10123 Comm: syz-executor.1 Not tainted 5.10.184 #1 [ 1976.714325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1976.716053] Call Trace: [ 1976.716605] dump_stack+0x107/0x167 [ 1976.717355] should_fail.cold+0x5/0xa [ 1976.718162] ? kvmalloc_node+0x119/0x170 [ 1976.719002] should_failslab+0x5/0x20 [ 1976.719789] __kmalloc_node+0x76/0x420 [ 1976.720579] ? __sanitizer_cov_trace_pc+0x30/0x60 [ 1976.721586] kvmalloc_node+0x119/0x170 [ 1976.722393] setxattr+0x14e/0x330 [ 1976.723098] ? vfs_setxattr+0x270/0x270 [ 1976.723929] ? lock_acquire+0x1b9/0x470 [ 1976.724755] ? lock_release+0x680/0x680 [ 1976.725576] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1976.726655] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1976.727759] ? trace_hardirqs_on+0x5b/0x180 [ 1976.728652] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1976.729766] ? __mnt_want_write+0x196/0x280 [ 1976.730681] __x64_sys_fsetxattr+0x1f9/0x290 [ 1976.731586] do_syscall_64+0x33/0x40 [ 1976.732350] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1976.733402] RIP: 0033:0x7f1be77ddb19 [ 1976.734168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1976.737926] RSP: 002b:00007f1be4d53188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1976.739495] RAX: ffffffffffffffda RBX: 00007f1be78f0f60 RCX: 00007f1be77ddb19 [ 1976.740960] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 1976.742441] RBP: 00007f1be4d531d0 R08: 0000000000000002 R09: 0000000000000000 [ 1976.743912] R10: 000000000000007c R11: 0000000000000246 R12: 0000000000000001 [ 1976.745379] R13: 00007ffea2f7189f R14: 00007f1be4d53300 R15: 0000000000022000 12:24:41 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:24:41 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 4) 12:24:41 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824010767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) [ 1976.896279] FAULT_INJECTION: forcing a failure. [ 1976.896279] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1976.898786] CPU: 1 PID: 10146 Comm: syz-executor.0 Not tainted 5.10.184 #1 [ 1976.900212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1976.901925] Call Trace: [ 1976.902483] dump_stack+0x107/0x167 [ 1976.903227] should_fail.cold+0x5/0xa [ 1976.903998] _copy_from_user+0x2e/0x1b0 [ 1976.904801] setxattr+0x188/0x330 [ 1976.905487] ? vfs_setxattr+0x270/0x270 [ 1976.906331] ? find_held_lock+0x2c/0x110 [ 1976.907166] ? lock_acquire+0x197/0x470 [ 1976.907968] ? __x64_sys_fsetxattr+0x176/0x290 [ 1976.908932] ? lock_release+0x680/0x680 [ 1976.909743] ? __fget_files+0x296/0x4c0 [ 1976.910568] ? __mnt_want_write+0x196/0x280 [ 1976.911456] __x64_sys_fsetxattr+0x1f9/0x290 [ 1976.912367] do_syscall_64+0x33/0x40 [ 1976.913137] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1976.914208] RIP: 0033:0x7f0e44587b19 [ 1976.914969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1976.918757] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1976.920320] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19 [ 1976.921804] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 1976.923225] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000 [ 1976.924737] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001 [ 1976.926224] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000 12:24:57 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea7150852e1fa8ad0600", 0xfffff, r0) 12:24:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) 12:24:57 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2) (fail_nth: 3) 12:24:57 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x0) (fail_nth: 2) 12:24:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 5) 12:24:57 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269020f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:57 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:57 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:24:57 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0400", 0xfffff, r0) [ 1993.314310] FAULT_INJECTION: forcing a failure. [ 1993.314310] name failslab, interval 1, probability 0, space 0, times 0 [ 1993.318582] CPU: 0 PID: 10159 Comm: syz-executor.1 Not tainted 5.10.184 #1 [ 1993.320014] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1993.321738] Call Trace: [ 1993.322299] dump_stack+0x107/0x167 [ 1993.323053] should_fail.cold+0x5/0xa [ 1993.323835] ? create_object.isra.0+0x3a/0xa20 [ 1993.324783] should_failslab+0x5/0x20 [ 1993.325563] kmem_cache_alloc+0x5b/0x310 [ 1993.326413] create_object.isra.0+0x3a/0xa20 [ 1993.327313] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1993.328356] __kmalloc_node+0x1ae/0x420 [ 1993.329189] kvmalloc_node+0x119/0x170 [ 1993.329992] setxattr+0x14e/0x330 [ 1993.330714] ? vfs_setxattr+0x270/0x270 [ 1993.331544] ? mark_held_locks+0x9e/0xe0 [ 1993.332385] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1993.333460] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1993.334572] ? trace_hardirqs_on+0x5b/0x180 [ 1993.335465] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1993.336589] ? mnt_want_write_file+0xf0/0x5f0 [ 1993.337497] ? __mnt_want_write+0x196/0x280 [ 1993.338403] __x64_sys_fsetxattr+0x1f9/0x290 [ 1993.339314] do_syscall_64+0x33/0x40 [ 1993.340077] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1993.341113] RIP: 0033:0x7f1be77ddb19 [ 1993.341872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1993.345579] RSP: 002b:00007f1be4d53188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1993.347177] RAX: ffffffffffffffda RBX: 00007f1be78f0f60 RCX: 00007f1be77ddb19 [ 1993.348629] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 1993.350084] RBP: 00007f1be4d531d0 R08: 0000000000000002 R09: 0000000000000000 [ 1993.351554] R10: 000000000000007c R11: 0000000000000246 R12: 0000000000000001 [ 1993.353022] R13: 00007ffea2f7189f R14: 00007f1be4d53300 R15: 0000000000022000 [ 1993.354494] FAULT_INJECTION: forcing a failure. [ 1993.354494] name failslab, interval 1, probability 0, space 0, times 0 [ 1993.357056] CPU: 1 PID: 10169 Comm: syz-executor.5 Not tainted 5.10.184 #1 [ 1993.358529] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1993.360209] Call Trace: [ 1993.360767] dump_stack+0x107/0x167 [ 1993.361512] should_fail.cold+0x5/0xa [ 1993.362321] ? kvmalloc_node+0x119/0x170 [ 1993.363145] should_failslab+0x5/0x20 [ 1993.363919] __kmalloc_node+0x76/0x420 [ 1993.364719] kvmalloc_node+0x119/0x170 [ 1993.365512] setxattr+0x14e/0x330 [ 1993.366214] ? vfs_setxattr+0x270/0x270 [ 1993.367033] ? find_held_lock+0x2c/0x110 12:24:57 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) [ 1993.367875] ? lock_acquire+0x197/0x470 [ 1993.368773] ? __x64_sys_fsetxattr+0x176/0x290 [ 1993.369709] ? lock_release+0x680/0x680 [ 1993.370549] ? __fget_files+0x296/0x4c0 [ 1993.371361] ? __mnt_want_write+0x196/0x280 [ 1993.372257] __x64_sys_fsetxattr+0x1f9/0x290 [ 1993.373159] do_syscall_64+0x33/0x40 [ 1993.373917] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1993.374966] RIP: 0033:0x7f12f0a7bb19 [ 1993.375736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1993.379446] RSP: 002b:00007f12edff1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1993.380987] RAX: ffffffffffffffda RBX: 00007f12f0b8ef60 RCX: 00007f12f0a7bb19 [ 1993.382443] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 1993.383881] RBP: 00007f12edff11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1993.385317] R10: 000000000000004c R11: 0000000000000246 R12: 0000000000000001 [ 1993.386766] R13: 00007ffc9195868f R14: 00007f12edff1300 R15: 0000000000022000 12:24:57 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269030f99ea715085731fa8ad0600", 0xfffff, r0) 12:24:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) [ 1993.468242] FAULT_INJECTION: forcing a failure. [ 1993.468242] name failslab, interval 1, probability 0, space 0, times 0 [ 1993.471984] CPU: 0 PID: 10165 Comm: syz-executor.0 Not tainted 5.10.184 #1 [ 1993.473379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1993.475101] Call Trace: [ 1993.475662] dump_stack+0x107/0x167 [ 1993.476414] should_fail.cold+0x5/0xa [ 1993.477215] ? posix_acl_alloc+0x20/0xb0 [ 1993.478051] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 1993.479009] should_failslab+0x5/0x20 [ 1993.479800] __kmalloc+0x72/0x390 [ 1993.480523] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 1993.481466] posix_acl_alloc+0x20/0xb0 [ 1993.482290] posix_acl_from_xattr+0xf5/0x4c0 [ 1993.483208] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 1993.484152] posix_acl_xattr_set+0x37/0x1b0 [ 1993.485036] __vfs_setxattr+0x10f/0x180 [ 1993.485857] ? xattr_resolve_name+0x3e0/0x3e0 [ 1993.486801] __vfs_setxattr_noperm+0x11a/0x4c0 [ 1993.487744] __vfs_setxattr_locked+0x1c3/0x250 [ 1993.488689] vfs_setxattr+0xe8/0x270 [ 1993.489460] ? __vfs_setxattr_locked+0x250/0x250 [ 1993.490443] setxattr+0x23d/0x330 [ 1993.491160] ? vfs_setxattr+0x270/0x270 [ 1993.491982] ? find_held_lock+0x2c/0x110 [ 1993.492826] ? lock_acquire+0x197/0x470 [ 1993.493637] ? __x64_sys_fsetxattr+0x176/0x290 [ 1993.494595] ? lock_release+0x680/0x680 [ 1993.495419] ? __fget_files+0x296/0x4c0 [ 1993.496239] ? __mnt_want_write+0x196/0x280 [ 1993.497131] __x64_sys_fsetxattr+0x1f9/0x290 [ 1993.498043] do_syscall_64+0x33/0x40 [ 1993.498815] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1993.499869] RIP: 0033:0x7f0e44587b19 [ 1993.500630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1993.504388] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1993.505944] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19 [ 1993.507408] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 1993.508852] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000 [ 1993.510330] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001 [ 1993.511781] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000 [ 1993.626366] Process accounting resumed 12:25:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 6) 12:25:10 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269040f99ea715085731fa8ad0600", 0xfffff, r0) 12:25:10 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2) (fail_nth: 4) 12:25:10 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad1000", 0xfffff, r0) 12:25:10 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x0) (fail_nth: 3) 12:25:10 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) 12:25:10 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8) sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) 12:25:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2) 12:25:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x64, 0x2) 12:25:10 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269100f99ea715085731fa8ad0600", 0xfffff, r0) [ 2006.304338] FAULT_INJECTION: forcing a failure. [ 2006.304338] name failslab, interval 1, probability 0, space 0, times 0 [ 2006.305683] CPU: 1 PID: 10192 Comm: syz-executor.5 Not tainted 5.10.184 #1 [ 2006.306429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2006.307348] Call Trace: [ 2006.307637] dump_stack+0x107/0x167 [ 2006.308027] should_fail.cold+0x5/0xa [ 2006.308446] ? create_object.isra.0+0x3a/0xa20 [ 2006.308938] should_failslab+0x5/0x20 [ 2006.309368] kmem_cache_alloc+0x5b/0x310 [ 2006.309815] ? lock_downgrade+0x6d0/0x6d0 [ 2006.310268] create_object.isra.0+0x3a/0xa20 [ 2006.310756] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2006.311313] __kmalloc_node+0x1ae/0x420 [ 2006.311751] kvmalloc_node+0x119/0x170 [ 2006.312174] setxattr+0x14e/0x330 [ 2006.312546] ? vfs_setxattr+0x270/0x270 [ 2006.312983] ? find_held_lock+0x2c/0x110 [ 2006.313423] ? lock_acquire+0x197/0x470 [ 2006.313847] ? __x64_sys_fsetxattr+0x176/0x290 [ 2006.314347] ? lock_release+0x680/0x680 [ 2006.314785] ? __fget_files+0x296/0x4c0 [ 2006.315222] ? __mnt_want_write+0x196/0x280 [ 2006.315691] __x64_sys_fsetxattr+0x1f9/0x290 [ 2006.316179] do_syscall_64+0x33/0x40 [ 2006.316594] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2006.317167] RIP: 0033:0x7f12f0a7bb19 [ 2006.317584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2006.319632] RSP: 002b:00007f12edff1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 2006.320481] RAX: ffffffffffffffda RBX: 00007f12f0b8ef60 RCX: 00007f12f0a7bb19 [ 2006.321276] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 2006.322073] RBP: 00007f12edff11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2006.322877] R10: 000000000000004c R11: 0000000000000246 R12: 0000000000000001 [ 2006.323681] R13: 00007ffc9195868f R14: 00007f12edff1300 R15: 0000000000022000 [ 2006.333667] FAULT_INJECTION: forcing a failure. [ 2006.333667] name failslab, interval 1, probability 0, space 0, times 0 [ 2006.334902] CPU: 1 PID: 10203 Comm: syz-executor.0 Not tainted 5.10.184 #1 [ 2006.335646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2006.336546] Call Trace: [ 2006.336832] dump_stack+0x107/0x167 [ 2006.337227] should_fail.cold+0x5/0xa [ 2006.337642] ? create_object.isra.0+0x3a/0xa20 [ 2006.338145] should_failslab+0x5/0x20 [ 2006.338566] kmem_cache_alloc+0x5b/0x310 [ 2006.339011] ? avc_has_perm+0xc5/0x1b0 [ 2006.339430] create_object.isra.0+0x3a/0xa20 [ 2006.339915] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2006.340464] __kmalloc+0x16e/0x390 [ 2006.340862] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 2006.341355] posix_acl_alloc+0x20/0xb0 [ 2006.341778] posix_acl_from_xattr+0xf5/0x4c0 [ 2006.342261] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 2006.342787] posix_acl_xattr_set+0x37/0x1b0 [ 2006.343276] __vfs_setxattr+0x10f/0x180 [ 2006.343724] ? xattr_resolve_name+0x3e0/0x3e0 [ 2006.344232] __vfs_setxattr_noperm+0x11a/0x4c0 [ 2006.344742] __vfs_setxattr_locked+0x1c3/0x250 [ 2006.345254] vfs_setxattr+0xe8/0x270 [ 2006.345671] ? __vfs_setxattr_locked+0x250/0x250 [ 2006.346213] setxattr+0x23d/0x330 [ 2006.346607] ? vfs_setxattr+0x270/0x270 [ 2006.347043] ? find_held_lock+0x2c/0x110 [ 2006.347505] ? lock_acquire+0x197/0x470 [ 2006.347941] ? __x64_sys_fsetxattr+0x176/0x290 [ 2006.348448] ? lock_release+0x680/0x680 [ 2006.348894] ? __fget_files+0x296/0x4c0 [ 2006.349339] ? __mnt_want_write+0x196/0x280 [ 2006.349824] __x64_sys_fsetxattr+0x1f9/0x290 [ 2006.350316] do_syscall_64+0x33/0x40 [ 2006.350748] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2006.351317] RIP: 0033:0x7f0e44587b19 [ 2006.351728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2006.353774] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 2006.354631] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19 [ 2006.355428] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 2006.356229] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000 [ 2006.357014] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001 [ 2006.357807] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000 [ 2006.363484] FAULT_INJECTION: forcing a failure. [ 2006.363484] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2006.364822] CPU: 1 PID: 10201 Comm: syz-executor.1 Not tainted 5.10.184 #1 [ 2006.365579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2006.366498] Call Trace: [ 2006.366792] dump_stack+0x107/0x167 [ 2006.367198] should_fail.cold+0x5/0xa 12:25:10 executing program 2: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) [ 2006.367631] _copy_from_user+0x2e/0x1b0 [ 2006.368266] setxattr+0x188/0x330 [ 2006.368637] ? vfs_setxattr+0x270/0x270 [ 2006.369060] ? find_held_lock+0x2c/0x110 [ 2006.369499] ? lock_acquire+0x197/0x470 [ 2006.369924] ? __x64_sys_fsetxattr+0x176/0x290 [ 2006.370412] ? lock_release+0x680/0x680 [ 2006.370857] ? __fget_files+0x296/0x4c0 [ 2006.371304] ? __mnt_want_write+0x196/0x280 [ 2006.371787] __x64_sys_fsetxattr+0x1f9/0x290 [ 2006.372275] do_syscall_64+0x33/0x40 [ 2006.372692] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2006.373258] RIP: 0033:0x7f1be77ddb19 [ 2006.373672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2006.375711] RSP: 002b:00007f1be4d53188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 2006.376550] RAX: ffffffffffffffda RBX: 00007f1be78f0f60 RCX: 00007f1be77ddb19 [ 2006.377337] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 2006.378126] RBP: 00007f1be4d531d0 R08: 0000000000000002 R09: 0000000000000000 [ 2006.378923] R10: 000000000000007c R11: 0000000000000246 R12: 0000000000000001 [ 2006.379708] R13: 00007ffea2f7189f R14: 00007f1be4d53300 R15: 0000000000022000 12:25:10 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0) stat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2) (fail_nth: 5) 12:25:10 executing program 6: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad1400", 0xfffff, r0) 12:25:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 7) 12:25:10 executing program 7: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269011099ea715085731fa8ad0600", 0xfffff, r0) [ 2006.500663] FAULT_INJECTION: forcing a failure. [ 2006.500663] name failslab, interval 1, probability 0, space 0, times 0 [ 2006.501917] CPU: 1 PID: 10216 Comm: syz-executor.0 Not tainted 5.10.184 #1 [ 2006.502662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2006.503548] Call Trace: [ 2006.503841] dump_stack+0x107/0x167 [ 2006.504234] should_fail.cold+0x5/0xa [ 2006.504647] ? jbd2__journal_start+0x190/0x7e0 [ 2006.505144] should_failslab+0x5/0x20 [ 2006.505557] kmem_cache_alloc+0x5b/0x310 [ 2006.505993] ? _down_write_nest_lock+0x160/0x160 [ 2006.506514] jbd2__journal_start+0x190/0x7e0 [ 2006.506991] __ext4_journal_start_sb+0x214/0x390 [ 2006.507501] ext4_set_acl+0x22a/0x590 [ 2006.507913] ? ext4_get_acl+0x650/0x650 [ 2006.508341] ? from_kuid_munged+0x130/0x130 [ 2006.508805] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2006.509346] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2006.509896] ? posix_acl_valid+0x204/0x330 [ 2006.510351] set_posix_acl+0x226/0x2d0 [ 2006.510795] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 2006.511306] posix_acl_xattr_set+0x8e/0x1b0 [ 2006.511784] __vfs_setxattr+0x10f/0x180 [ 2006.512229] ? xattr_resolve_name+0x3e0/0x3e0 [ 2006.512735] __vfs_setxattr_noperm+0x11a/0x4c0 [ 2006.513246] __vfs_setxattr_locked+0x1c3/0x250 [ 2006.513769] vfs_setxattr+0xe8/0x270 [ 2006.514185] ? __vfs_setxattr_locked+0x250/0x250 [ 2006.514739] setxattr+0x23d/0x330 [ 2006.515125] ? vfs_setxattr+0x270/0x270 [ 2006.515568] ? find_held_lock+0x2c/0x110 [ 2006.516026] ? lock_acquire+0x197/0x470 [ 2006.516474] ? __x64_sys_fsetxattr+0x176/0x290 [ 2006.516981] ? lock_release+0x680/0x680 [ 2006.517450] ? __fget_files+0x296/0x4c0 [ 2006.517901] ? __mnt_want_write+0x196/0x280 [ 2006.518398] __x64_sys_fsetxattr+0x1f9/0x290 [ 2006.518900] do_syscall_64+0x33/0x40 [ 2006.519317] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2006.519886] RIP: 0033:0x7f0e44587b19 [ 2006.520301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2006.522336] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 2006.523201] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19 [ 2006.523992] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 2006.524779] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000 [ 2006.525571] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001 [ 2006.526366] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000 [ 2006.622546] FAULT_INJECTION: forcing a failure. [ 2006.622546] name failslab, interval 1, probability 0, space 0, times 0 [ 2006.625421] CPU: 0 PID: 10217 Comm: syz-executor.1 Not tainted 5.10.184 #1 [ 2006.626997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2006.628811] Call Trace: [ 2006.629395] dump_stack+0x107/0x167 [ 2006.630215] should_fail.cold+0x5/0xa [ 2006.631050] ? posix_acl_alloc+0x20/0xb0 [ 2006.631953] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 2006.632977] should_failslab+0x5/0x20 [ 2006.633818] __kmalloc+0x72/0x390 [ 2006.634587] ? _raw_spin_unlock_irq+0x27/0x30 [ 2006.635578] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 2006.636583] posix_acl_alloc+0x20/0xb0 [ 2006.637426] posix_acl_from_xattr+0xf5/0x4c0 [ 2006.638385] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 2006.639406] posix_acl_xattr_set+0x37/0x1b0 [ 2006.640345] __vfs_setxattr+0x10f/0x180 [ 2006.641210] ? xattr_resolve_name+0x3e0/0x3e0 [ 2006.642200] __vfs_setxattr_noperm+0x11a/0x4c0 [ 2006.643207] __vfs_setxattr_locked+0x1c3/0x250 [ 2006.644205] vfs_setxattr+0xe8/0x270 [ 2006.645020] ? __vfs_setxattr_locked+0x250/0x250 [ 2006.646061] setxattr+0x23d/0x330 [ 2006.646832] ? vfs_setxattr+0x270/0x270 [ 2006.647717] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2006.648873] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2006.650044] ? trace_hardirqs_on+0x5b/0x180 [ 2006.650998] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2006.652188] ? __mnt_want_write+0x12/0x280 [ 2006.653106] ? __mnt_want_write+0x40/0x280 [ 2006.654024] ? __mnt_want_write+0x196/0x280 [ 2006.654978] __x64_sys_fsetxattr+0x1f9/0x290 [ 2006.655937] do_syscall_64+0x33/0x40 [ 2006.656760] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2006.657869] RIP: 0033:0x7f1be77ddb19 [ 2006.658701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2006.662698] RSP: 002b:00007f1be4d53188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 2006.664382] RAX: ffffffffffffffda RBX: 00007f1be78f0f60 RCX: 00007f1be77ddb19 [ 2006.665939] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003 [ 2006.667526] RBP: 00007f1be4d531d0 R08: 0000000000000002 R09: 0000000000000000 [ 2006.669103] R10: 000000000000007c R11: 0000000000000246 R12: 0000000000000001 [ 2006.670783] R13: 00007ffea2f7189f R14: 00007f1be4d53300 R15: 0000000000022000 BUG: leak checking failed VM DIAGNOSIS: 12:25:10 Registers: info registers vcpu 0 RAX=ffffffff814cb29e RBX=dffffc0000000000 RCX=ffffffff8141848f RDX=0000000000000000 RSI=ffffffff814c776e RDI=ffffffff84bd8248 RBP=ffff888049eefcd0 RSP=ffff888049eefc08 R8 =0000000000000001 R9 =0000000000000001 R10=000000007fff0000 R11=0000000000000001 R12=000000000000005d R13=ffffed10093ddf9c R14=ffff888049eefce0 R15=ffffc900006c3060 RIP=ffffffff814cb29e RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f2bcfbe78c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000056270e92e3f8 CR3=000000005c304000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=696e656420737365636341002f737973 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=000056270e903a70000056270e0c50d0 XMM06=000056270e9450600000000000000000 XMM07=00000000000000000000000000000000 XMM08=610064253a64252f6b636f6c622f7665 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=dffffc0000000000 RBX=0000000000000040 RCX=ffffffff815fec09 RDX=ffff88804acbb480 RSI=ffffffff815ff5ef RDI=0000000000000005 RBP=ffff888054e1dd00 RSP=ffff88804e0a7d70 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=000056270e908d98 R13=ffff888054e1dd40 R14=ffff888054e1dd50 R15=ffff88804acbb480 RIP=ffffffff815ff602 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f2bcfbe78c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000056270e908d98 CR3=0000000049c4c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffff00ffffff00000000000000000000 XMM02=ffffff0f0e0d0c0b0a09080706050403 XMM03=696e656420737365636341002f737973 XMM04=00000001ffffffff000056270e943a60 XMM05=00000000000000000000000000000000 XMM06=000056270e93bb100000000200000004 XMM07=00000000000000000000000000000000 XMM08=2064616572206f742064656c69614600 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000