el.perf_event_max_sample_rate to 49000 [ 961.572019] perf: interrupt took too long (5016 > 5003), lowering kernel.perf_event_max_sample_rate to 39000 [ 961.576059] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. [ 961.595222] perf: interrupt took too long (6339 > 6270), lowering kernel.perf_event_max_sample_rate to 31000 [ 961.619763] perf: interrupt took too long (7942 > 7923), lowering kernel.perf_event_max_sample_rate to 25000 05:18:38 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:18:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:18:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:18:38 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x2000, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x12300, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180), 0x7}, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000030003d01000000000000000000000000080001"], 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000004600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpeername$netlink(r0, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000e40)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="28ffffffe5040500fdffffff00e5ffffffffffff04000100010000000a000200000000001331cf97d9f3a0d07b66020000000be9cd480084dfbab98ada2e2bc368d4ed4275bbcc182511eb5ab952"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000400)=[{{&(0x7f0000000100)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/232, 0xe8}, {&(0x7f0000000380)=""/109, 0x6d}, {&(0x7f0000000c80)=""/86, 0x56}], 0x3, &(0x7f0000000d00)=""/131, 0x83}, 0x7}], 0x1, 0x40010120, 0x0) openat$sr(0xffffffffffffff9c, 0x0, 0x800, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$DVD_READ_STRUCT(r4, 0x5390, &(0x7f0000000440)=@bca={0x3, 0xbc, "0bfd243824f34ce8addf309a4a8f5ef8c99d23328e05f7cb7e8ebc432ccd41c62a899ac1f2d8a76328fd6f0848fd2f39cf451e1ac25261c3005e2170d5c7189ed1e5968387599944b32e5ca794871b07c6280b4cde6993fe9398434484c0ac61e9c6d0d0e30976d951e684d1948bd68ec19351b7af5f4b703a606d62fcf8154474194813d0e358afc1bfbc5918642549f51f89fcf5dc4727413f8945bee26b64e467c97a41f0ee8ed58258fd5acc078fed4995b1f6f12b29ae3d1c30"}) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @loopback}, 0x4) 05:18:38 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010000001800000026385754c4309a93f9de031bf0991639c900f9bbed430370a7b50d6470c9a844cd8fe3ba5aad028cbbc02b1974fd986211e21f8e92bb79a807c8ead351f5d12437f8804d1373622b649ee3c09992af3f396223b57f1387cdd0407e8f2054f16194649bd28411d4ef32790478854c2d8528e6ad3bdcba41488720da10f7a079d6e896a594595594404923f2e99cb1ecc339fd07af46fd450684075ada0e4b0a827365a5d2fdbcd326e3ad4bb18232310b2023cbe1d81cc3146f4acf2d06a5140161", @ANYRES32=r0, @ANYBLOB="d9d2000000d72f5bf0460e83e89bbfb5"]) perf_event_open(0x0, 0x0, 0x4, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x6, r0, 0xffffffffffffffff) setsockopt$sock_int(r3, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) r4 = pkey_alloc(0x0, 0x2) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e24, 0x1f, @private2={0xfc, 0x2, '\x00', 0x1}, 0xb2}, 0x1c) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000002, r4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x6, &(0x7f0000ffc000/0x4000)=nil) fallocate(0xffffffffffffffff, 0x25, 0xf6a2, 0x1) 05:18:38 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:18:38 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[@ANYRES16], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:18:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, 0x0, 0x4000) ftruncate(r0, 0x1000003) close(r1) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x212801) r3 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000140)=r4, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4, @out_args}, './file1\x00'}) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 977.641070] perf: interrupt took too long (9928 > 9927), lowering kernel.perf_event_max_sample_rate to 20000 [ 977.689593] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 977.759143] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 05:18:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 977.799476] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 05:18:38 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:18:38 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:18:38 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000000c0)={[0x200]}, 0x8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4c00) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f0000000a00)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x5c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2400c044}, 0x8800) copy_file_range(r3, 0x0, r2, 0x0, 0x10001, 0x0) mkdirat(r2, &(0x7f0000000040)='./file1\x00', 0x18) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x5, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1, {0x0, r6}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x31d, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x744) sendfile(r2, r5, 0x0, 0x20d315) 05:18:38 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r4 = dup2(r0, 0xffffffffffffffff) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = getpgrp(0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r7, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) sendmmsg$inet6(r6, &(0x7f0000004d00), 0x2f, 0x0) pidfd_open(r5, 0x0) syz_open_procfs(r5, &(0x7f0000000040)='net/xfrm_stat\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x9, 0x9, 0x1, 0x0, 0x0, 0xfce9, 0x869, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0x2, 0x1}, 0x5d1a, 0x3ff, 0x4, 0x7, 0xffffffffffff7fff, 0xfffff309, 0x3, 0x0, 0x3, 0x0, 0xbbe}, r5, 0xd, r4, 0x8) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r8, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x7, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0xf4}, 0x20, 0x704708b, 0x0, 0x2, 0x0, 0xffffffff, 0x3f, 0x0, 0xb0, 0x0, 0x40}, 0x0, 0xb, 0xffffffffffffffff, 0x3) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), 0xffffffffffffffff) 05:18:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:18:38 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[@ANYRES16], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:18:38 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:18:38 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:18:54 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(0x0, &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:18:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:18:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:18:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, 0x0, 0x4000) ftruncate(r0, 0x1000003) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x212801) r3 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000140)=r4, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4, @in_args={0x2}}, './file1\x00'}) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 05:18:54 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:18:54 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) openat(0xffffffffffffffff, 0x0, 0x0, 0x20) fsmount(0xffffffffffffffff, 0x0, 0x88) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/netlink\x00') r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x6}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x5, 0x9, 0x0, 0xc, 0x210, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x40, 0x9, 0x9, 0x0, 0xfffffffffffffffc, 0xffff, 0x4, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x2, r2, 0x2) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x1f, 0x2, 0x8, 0x0, 0x8000, 0x10000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000080), 0x9}, 0x10000, 0x101, 0x3, 0x7, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, r3, 0x4) readv(r0, &(0x7f0000001940)=[{&(0x7f0000000240)}, {&(0x7f0000000500)=""/232, 0xe8}, {&(0x7f0000000600)=""/254, 0xfe}, {&(0x7f0000000700)=""/134, 0x86}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x6) syz_io_uring_setup(0x7f02, &(0x7f0000000240)={0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000100)={0x4, 0x401, 0x46, 0x9, 0x6, 0x7582}) 05:18:54 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:18:54 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[@ANYRES16], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:18:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f00000000c0)=0xfffffffe, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="340000c771c42b31c60c002200010d00fffffffffffffff7008d0086b35bb76d9218c1a8f81db748b3734399141fe97140cae9736de6d42b7551cbd2ad8c27f47f39ab4a03f1076aff4a77caabb0fc4a95c0dd5096c3c8552befa070b164bffec7a54a0401fa11a1155556961a6bb7c68ad79e6032884733d6c3fe226e942ba7004a3c1dd6ccf6a27f54277e84fe5b7dcd119baebe562ff487cd0ed0fffb7bf13f246609c4afcd798e81ba31faeca86c92c0172c0dad8375672971a308fcad1d058f2d63327de82e28673eaf26c1d1d54fd0affe847a069510"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) copy_file_range(r1, &(0x7f0000000040)=0x8000000, r0, &(0x7f0000000100)=0x5, 0x4, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="200029bd7000fddbdf2505000000080001007063690011004200303030303a30303a31302e3000000000c2f029692b08000300020000000e0001006e657464657673696d0000000f00b05510077464657673696d300000080003000200000088b9c21b62ba9ceb18f82a6a35bbfd9d5934745aef18b7040fb37fd2f7a1aa3ebfff0912e008a65a708f18dd6a5f5c5043068940a05ee7b7440dd1c701fb06a3fba66b7b0bc0"], 0x60}, 0x1, 0x0, 0x0, 0xc010}, 0x8040) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup2(r3, r0) ioctl$LOOP_SET_FD(r4, 0x4c00, r1) fsetxattr$security_evm(r3, &(0x7f0000000140), &(0x7f00000001c0)=@sha1={0x1, "80f008000000000000009f5500"}, 0x15, 0x4) 05:18:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x10000, 0x0, 0x0, 0x0, 0x40a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)="3e3fc2db0956", 0x6}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) r2 = epoll_create1(0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000100)) fcntl$dupfd(r1, 0x0, r3) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x7}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x4008240b, &(0x7f0000000000)='\x06\x00\x00\x00') readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/170, 0xaa}], 0x1) connect$netlink(r1, &(0x7f0000000140)=@unspec, 0xc) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) acct(0x0) 05:18:54 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 994.200698] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8529 comm=syz-executor.4 05:18:54 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:18:54 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(0x0, &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:18:54 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:18:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) statx(0xffffffffffffffff, 0x0, 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r2, r3, 0x1000) r4 = getuid() fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v3={0x3000000, [{0x1, 0x1a6f}, {0x572, 0x7}], r4}, 0x18, 0x0) syncfs(r1) write$binfmt_elf64(r0, 0x0, 0xfdef) 05:18:54 executing program 7: syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbbb86dd6096153f00181100fe880000000000000000000000000001ff0200000000000000000000000000010000907800010000200100000000000000000000000000026d0943f6a1c7ef6f589b201d441532fbc07a8280919407643e5ab05b562ae2c2f2f0d0b19b01a9c2736b8a845ff0408ec38dfc29c12ce4ec265b9ca7766a40daaef10e49e74668526df1b35a4ded639d45cafdcee9ea083d772bf769807f14acd36b36d5dfc4dc8a9a1e0c4d6f26fbbeb483b2678f41981b"], 0x0) syz_emit_ethernet(0xe6, &(0x7f0000000100)={@empty, @remote, @void, {@ipv4={0x800, @icmp={{0x34, 0x4, 0x0, 0x3e, 0xd8, 0x66, 0x0, 0x7f, 0x1, 0x0, @multicast1, @remote, {[@timestamp={0x44, 0x8, 0x2c, 0x0, 0xb, [0x6]}, @end, @rr={0x7, 0xf, 0x40, [@multicast1, @broadcast, @multicast1]}, @timestamp_addr={0x44, 0x24, 0xe4, 0x1, 0x1, [{@empty, 0x195}, {@empty, 0x9}, {@remote, 0x8}, {@private=0xa010102, 0x8}]}, @timestamp_addr={0x44, 0x3c, 0x9f, 0x1, 0xd, [{@multicast1, 0x5}, {@broadcast, 0x1ff}, {@multicast1}, {@multicast1, 0x1dc2}, {@multicast2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8001}, {@empty, 0xa8b}]}, @ssrr={0x89, 0x1f, 0x36, [@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @local, @loopback, @private=0xa010102, @loopback, @empty]}, @timestamp={0x44, 0x10, 0x41, 0x0, 0x6, [0x0, 0x9, 0x6]}, @generic={0x94, 0xc, "91f9d60c17895aa9afa8"}, @lsrr={0x83, 0x7, 0x70, [@loopback]}]}}, @address_request={0x11, 0x0, 0x0, 0x54}}}}}, &(0x7f0000000200)={0x0, 0x3, [0x183, 0xc31, 0x333, 0x9ca]}) 05:18:55 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 994.926603] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8557 comm=syz-executor.4 05:19:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:19:10 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(0x0, &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:19:10 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:19:10 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'lo\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) sendmsg$inet(r1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xfb, 0x9, 0x0, 0x77, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x0, 0x0, 0xffffffbd, 0x8, 0x0, 0xfffffffd, 0xfffd, 0x0, 0x2, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth0_vlan\x00'}) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="667247e991a181"]) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000280)=0x3, 0x4) 05:19:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) statx(0xffffffffffffffff, 0x0, 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r2, r3, 0x1000) r4 = getuid() fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v3={0x3000000, [{0x1, 0x1a6f}, {0x572, 0x7}], r4}, 0x18, 0x0) syncfs(r1) write$binfmt_elf64(r0, 0x0, 0xfdef) 05:19:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:19:10 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1010.601620] EXT4-fs (loop7): Unrecognized mount option "frGé‘¡" or missing value 05:19:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1010.679749] EXT4-fs (loop7): Unrecognized mount option "frGé‘¡" or missing value 05:19:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:19:11 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:11 executing program 7: r0 = socket$inet(0x2, 0xa, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x1, {0x2}}, 0x6f}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8917, &(0x7f0000000040)={'veth0_to_batadv\x00', {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r0) recvmmsg(r0, &(0x7f0000003e00)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)=""/157, 0x9d}, {&(0x7f0000000340)=""/246, 0xf6}, {&(0x7f0000000440)=""/170, 0xaa}, {&(0x7f0000000080)=""/13, 0xd}], 0x4}, 0x7ff}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000200)=""/51, 0x33}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x2, &(0x7f0000001540)=""/168, 0xa8}, 0x8}, {{&(0x7f0000001600)=@ieee802154, 0x80, &(0x7f0000003840)=[{&(0x7f0000001680)=""/88, 0x58}, {&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000002700)=""/4096, 0x1000}, {&(0x7f0000003700)=""/11, 0xb}, {&(0x7f0000003740)=""/44, 0x2c}, {&(0x7f0000003780)=""/145, 0x91}], 0x6, &(0x7f00000038c0)=""/24, 0x18}, 0x4}, {{0x0, 0x0, &(0x7f0000003d00)=[{&(0x7f0000003900)=""/173, 0xad}, {&(0x7f00000039c0)=""/37, 0x25}, {&(0x7f0000003a00)=""/42, 0x2a}, {&(0x7f0000003a40)=""/198, 0xc6}, {&(0x7f0000003b40)=""/182, 0xb6}, {&(0x7f0000003c00)=""/204, 0xcc}], 0x6, &(0x7f0000003d80)=""/128, 0x80}, 0x7}], 0x4, 0x40000042, 0x0) listen(r4, 0x5) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) 05:19:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:19:11 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:19:11 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:28 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:28 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_dev$vcsn(&(0x7f0000000240), 0x8, 0x400002) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x8, 0x4, 0x0, 0x4, 0x0, 0x49, 0xc401, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xe25, 0x1, @perf_config_ext={0x923, 0x7fff}, 0x10840, 0x6, 0xb, 0x9, 0x4, 0x5, 0x0, 0x0, 0x1, 0x0, 0x80000001}, 0xffffffffffffffff, 0x7, r1, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r2, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000180), 0x1, 0x10302) r5 = openat2(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x6c2, 0x60, 0x6}, 0x18) fcntl$dupfd(r0, 0x0, r5) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x4, 0x20, 0x8, 0x8, 0x0, 0x1, 0x808, 0x9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x5, @perf_bp={&(0x7f00000000c0)}, 0x4, 0x1ff, 0x4, 0x6, 0x5, 0x7fff, 0xd51, 0x0, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r4, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x300, 0x100) openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) dup2(r6, r3) 05:19:28 executing program 2: sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40010204}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="b4000000", @ANYRES16=0x0, @ANYBLOB="020027bd7000fbdbdf25180000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000200000008000b00ff01000006001600a8000000050012000000000006001100ff03000008000b003406001a0e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000100000008000b008000000006001600070000000500120000000000060011000400000008000b00ffffff7f"], 0xb4}, 0x1, 0x0, 0x0, 0x88a5}, 0x4000) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000740)=ANY=[@ANYBLOB="980000002200010000000100000001001700000053e958150660f025669ecda541e10b61cc65af669e0f2c4873e1c2891862f4aeec84d9fbfb3910bed509859ccf62310bde2b06b7bdaf0823a82ff5b6f418f821a978e2e53f7b2984909dcbf6fa638a7ed838ac778622e53e83d993e69d75678067e16a4d"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, r1, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xfffffffa}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x14}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x20}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x100}]}, 0x64}, 0x1, 0x0, 0x0, 0x4001}, 0x4800) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f00000008c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000880)={&(0x7f0000000380)={0x3c, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_AP_ISOLATE={0x5}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x5}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x1}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0xed}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x81}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x880) sendmsg$nl_generic(r0, &(0x7f0000000700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)={0x15c, 0x3f, 0x8, 0x70bd29, 0x25dfdbff, {0x16}, [@typed={0x8, 0x88, 0x0, 0x0, @u32=0x1}, @nested={0x4c, 0xd, 0x0, 0x1, [@typed={0x12, 0x60, 0x0, 0x0, @str='/:+##-(%{L}(!\x00'}, @generic="e1f1ebb59b81a513e9c02cc7", @typed={0x8, 0x70, 0x0, 0x0, @uid=r2}, @generic="18df69a5166b0071366a953853adb2b04921dadf557234caa98ce53f186952cb"]}, @typed={0x8, 0x11, 0x0, 0x0, @ipv4=@local}, @nested={0xe9, 0x4e, 0x0, 0x1, [@typed={0x8, 0x76, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x91, 0x0, 0x0, @uid=r3}, @generic="77db1f844bb27826fa2fb80e345e0a7d6f37466c42c305ef6f6d544972722c0eeb1ac4332ddb3b789cfd47c1cfe9fc3b95151227edb598fa4c7d22f237f90238baaf17ad36809685c62d5f69c505921db16bf0e40a789272b74ed2a8b4833f87d0489fd08618c860048fe9a7e3e4790580707a52ffe66addc12596e0f664e6bd42078e05b4b160f003ee55ce7a6b07bd1cc8ae0c29575d5b630b5e36129ed3d5c75ebf5ce1baadbe53e38f9f443f744ca8ad295a7c49ea8fd564322cc17917bf06", @generic="d3e6d4b3bf75470fee68d2c6702e6b5a0d29e986"]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) syz_emit_ethernet(0x5e, &(0x7f00000007c0)=ANY=[@ANYBLOB="0180c200000000000000000008004d00005000000000008890780a010101ac1414aa4420ec4000000005000000060000ffd4501360ff000000040000000400000824000000060c00907800800200ffff000000000000002f0000ac141400000000006400000000000000003c754235e02a6964013b69f735f8ee809fe999bc5a7bc08207f7169d098eaf265ff4d096e4e0b2d41ef6251e19581dbdf80fd09205bf9b6f35658931d01a2ff7925b17f00b"], 0x0) 05:19:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:19:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x48, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/locks\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffe3) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW2(r2, 0x4b72, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "f2695c43faf79979fcc2000300"}) ioctl$TCSETSF(r2, 0x5404, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r1) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x8c1) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)) syz_io_uring_submit(r3, 0x0, &(0x7f0000000240)=@IORING_OP_CLOSE={0x13, 0x1}, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r5, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$netlink(r5, &(0x7f0000000540)={&(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)=[{&(0x7f0000000300)={0xa4, 0x25, 0x200, 0x70bd29, 0x25dfdbfd, "", [@generic="d6360e58ab", @typed={0xc, 0x84, 0x0, 0x0, @u64=0x1f}, @generic="1613c4058ce0c6946091af7547ca1b3857b72bad1e5392c77321bf3f50b86894159bcaba88e69dff46ac6c99909802a2fc9c239e6247e2bb60c0d2a1365e1e88d5638cec3cf32194720b4b4f2fe6426d4b6fb8db73866e649c82ef8d0e4e3af1fdd1dd014cb506cff1a4b48cab", @typed={0x14, 0x80, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x28}}]}, 0xa4}, {&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x13c}], 0x2}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) dup2(r6, r4) 05:19:28 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:19:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:19:28 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1027.830605] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8630 comm=syz-executor.2 [ 1027.832786] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8630 comm=syz-executor.2 [ 1027.833874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63 sclass=netlink_route_socket pid=8630 comm=syz-executor.2 [ 1027.840762] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64 sclass=netlink_route_socket pid=8621 comm=syz-executor.4 [ 1027.889103] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64 sclass=netlink_route_socket pid=8621 comm=syz-executor.4 05:19:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2) syz_open_procfs(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffff8) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000240)='./mnt\x00', 0x0, 0x1) stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0xfffffffc, 0x2) mount$9p_unix(0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) listen(0xffffffffffffffff, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000001380)=""/213, 0xd5}, {0x0}], 0x2, 0x5545, 0x0) 05:19:28 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:28 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:28 executing program 4: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x24, r1}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@private0={0xfc, 0x0, '\x00', 0x1}, r1}, 0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_uring_enter(0xffffffffffffffff, 0x4eae, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x7eea, 0x8, 0x0, 0x235}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f00000001c0)) fcntl$setownex(r2, 0xf, &(0x7f0000000000)={0x1, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x28a000, 0x83) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000004c0)) 05:19:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40040, 0x8) [ 1028.562274] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8630 comm=syz-executor.2 [ 1028.563825] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8659 comm=syz-executor.2 [ 1028.565092] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63 sclass=netlink_route_socket pid=8630 comm=syz-executor.2 05:19:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:19:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:19:43 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:43 executing program 7: r0 = memfd_create(&(0x7f0000000100)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\x82\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf2\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\xb5\xc6#w\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87\x8d\x8d\x82|\x94\x10\xdaU', 0x5) pwritev2(r0, &(0x7f0000000200)=[{&(0x7f0000000080)="fa", 0x1}], 0x1, 0x400006, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7}) pread64(r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) syz_genetlink_get_family_id$smc(&(0x7f00000001c0), r1) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESOCT, @ANYBLOB="00042cbd7000fbdbdf250a000000050030000100000005002e0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) 05:19:43 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:43 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:19:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:19:43 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ff0000/0xd000)=nil, 0x0) shmctl$IPC_RMID(r1, 0x0) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000000)=""/137) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r2, &(0x7f0000ff0000/0xd000)=nil, 0x0) shmctl$IPC_RMID(r2, 0x0) r3 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r3, &(0x7f0000ff0000/0xd000)=nil, 0x0) shmat(r3, &(0x7f0000ff3000/0x1000)=nil, 0x2000) shmctl$IPC_RMID(r3, 0x0) shmat(r3, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x0, 0x0, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) 05:19:43 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:43 executing program 7: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000080)=0x2) getpgid(0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000002c0)={0x0, 0x82, "9c5ae8", 0x1f, 0x7}) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000140)={0x3, 0x7ff, "e30cb0", 0x8, 0xb6}) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000000c0)={0x4, 0x0, 0x2f, "2988e13e"}) ioctl$sock_bt_hci(r1, 0x800448d2, &(0x7f0000000080)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={@ipv4={'\x00', '\xff\xff', @empty}, 0x4b}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000000000f0000200", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000006c0)={0x1000, 0x10000, 0x1, "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"}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ptrace(0x10, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000600)={0xa2, 0x7, 0x7, "265aa11f996c0b56a387b534af9dd3ad982054ba958c433b7a44975bb4c4d1f8749a46123589174f9aec087b2fb3d0cf6fd0bb343a190c8f380ea3a7c0c65143ae3c12ec4551e9a9574fc1a3826fec29a338fc3663f4336fa8a791c39623aa020444c387e12456513ca3ea901315b011132fda586a85515f983939442ecc5491f898b065dc9e0e999125ff7553e16976402962d3fd61397625d325e3c1d04615548d"}) waitid(0x0, 0x0, &(0x7f0000000300), 0x41000004, &(0x7f0000000540)) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:43 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:43 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:43 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:19:43 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:44 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:19:44 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:19:44 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:19:44 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:19:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1045.268307] Bluetooth: hci0: command 0x0401 tx timeout [ 1045.332205] Bluetooth: hci3: command 0x0401 tx timeout [ 1047.316269] Bluetooth: hci0: command 0x0401 tx timeout [ 1047.380219] Bluetooth: hci3: command 0x0401 tx timeout 05:20:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:20:00 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:00 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x42) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write(r0, &(0x7f0000001480)="0e137443b283213ac80beb6334e162e4bb52f91fad07cc37c7f03878234f38a20d10c6ccd40d2015afeff411e40f2a7d8b142b7975b12209f201dd291220aeb8f15445609584c22d0e704932dca09de57a726e6fa26bd5e67ee217d43f823fe2d1b0250e390a880967612ed9a9476894116223d98c8526d2c4e42aa1b2ac49ffee934ce766186eb9a8c4ddcad91c8dbb02bc3bde03b68579158f06a8b2a49c46ce9a01b14fa072027d77b693a7249be1aa5d1b65a4ba8f9ac8e5331623710c0e082590d40a2739523e0c78b0b9", 0xcd) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000001300)=ANY=[@ANYBLOB="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"]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000200)=0x4) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r4, 0x6) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[]) r5 = epoll_create(0x3) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f00000001c0)={0x0, 0x2, r5, 0xff800000}) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r3, 0x5000940f, &(0x7f0000000300)={{}, "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"}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000240)=0x67bb, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000100)={0x101, 0x0, 0x0, 'queue0\x00'}) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfe}, 0xc) 05:20:00 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:00 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x9, 0x7, 0x2, 0x8, 0x0, 0x6, 0x11524, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x1, @perf_config_ext={0x2, 0x100000000}, 0x16a52, 0x8, 0x0, 0x5, 0x9, 0x401, 0x41, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x1) recvmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000140), 0x6e, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/85, 0x55}, {&(0x7f0000000000)=""/52, 0x34}, {&(0x7f0000000240)=""/155, 0x9b}], 0x3, &(0x7f0000000340)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}, 0x2002) recvmsg$unix(r2, &(0x7f0000002a00)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f0000002900)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/124, 0x7c}, {&(0x7f0000001540)=""/95, 0x5f}, {&(0x7f00000015c0)=""/20, 0x14}, {&(0x7f0000001600)=""/68, 0x44}, {&(0x7f0000001680)=""/79, 0x4f}, {&(0x7f0000001700)=""/85, 0x55}, {&(0x7f0000001780)=""/227, 0xe3}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/124, 0x7c}], 0xa, &(0x7f00000029c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x20}, 0x40000042) r6 = fsmount(r3, 0x1, 0x80) openat(r6, &(0x7f0000002ac0)='./file0\x00', 0x0, 0x81) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000002a40)=ANY=[@ANYBLOB='\x00', @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYBLOB='./file0\x00']) dup2(r0, r1) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r7, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000002a80)={{0x1, 0x1, 0x18, r7, {0x9}}, './file0\x00'}) 05:20:00 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:20:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:20:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:20:00 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:20:00 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8000}, 0x4) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x1, 0x1000}, 0x4) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) fallocate(r0, 0x1, 0x4, 0x2) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x4, 0xf, 0x0, 0x0, 0x200000000061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14000, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @random="f9cc9c2089dc"}, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x8000) sendmmsg$inet(r3, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r5], 0x38}}], 0x1, 0x0) r6 = getpgrp(0x0) pidfd_open(r6, 0x0) syz_open_procfs(r6, &(0x7f0000000040)='net/xfrm_stat\x00') r7 = socket(0xb, 0xa, 0x7f) kcmp(0x0, r6, 0x5, r7, r4) 05:20:00 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:20:00 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:20:00 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:16 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:20:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:20:16 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:20:16 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) mknodat$loop(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), r1) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/24, 0x18}, {&(0x7f0000000140)=""/127, 0x7f}], 0x2, 0x9, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@reiserfs_2={0x8}, 0x0, 0x0) 05:20:16 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) 05:20:16 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:20:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:20:16 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) 05:20:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:20:17 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb58906d6b66732e66617400028020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x20000000001e0}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0072b9c91f40602a1e6483ab7be9b81edc43c2d8cfbfee378a1f28eb7278d15f78a3a5c0c301ad2ba3ae37139ee6209abf692c4dcdd0376980daa679ddc1136b75a9d371b7dc256a3e77046bd4ccd9f7de17ca0589acc47af9"]) creat(&(0x7f0000000040)='./file0\x00', 0x14) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYRESDEC=r1], 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x0) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/234, 0xea}, {&(0x7f0000000280)=""/139, 0x8b}], 0x2, 0x100, 0xe9) 05:20:17 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) [ 1076.686932] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:20:17 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:17 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:17 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:20:17 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:34 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:20:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:20:34 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:20:34 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:20:34 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:20:34 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000140)='.pending_reads\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0xfffffffe, 0xffffffff, 0x809}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105102, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048fc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000491c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000493c0)={0xff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5, r4}, {r5}], 0x4, "f2d92e724a8be1"}) close(r2) perf_event_open(&(0x7f0000000240)={0x6, 0x80, 0x0, 0x5, 0x0, 0x4, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0x9}, 0x40008, 0x0, 0x0, 0x7, 0x0, 0x7, 0x9, 0x0, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0x3) signalfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x2) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r7, 0x1, 0x23, &(0x7f0000000080)=0x401, 0x4) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, &(0x7f00000002c0)=""/4096, &(0x7f00000000c0)=0x1000) 05:20:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f00000014c0), r1) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000015c0)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001500)={0x58, r3, 0x8, 0x70bd27, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x1}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$unix(r0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) sendmsg$unix(r0, &(0x7f0000001400)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001380)=[{&(0x7f0000000080)="2800520c67691f312905bdc66b34236f4b7dca538ce1270a598dce8c194c5225cb952169bcbd20e5384d9922c9a32bd3fdb27c8a0ef6ab4ceece8fae55a41e99008f9d1a0d2c4436a2d2d4f3da57dc11fb8e3873bec9253f5249999fbf2ecae9f060251d59c06e32ac3ac432a8c17262370f732f88d8d6554b00a06d272ad9a1dd71993c71953b0a187849c3c96c9e3a895b259227303afd8c95", 0x9a}, {&(0x7f0000000140)="ec1bdedaa3ead6fc4f31", 0xa}, {&(0x7f0000000180)="188d5c0c9e1be80cdd2235bc96f8ddae899f1e5cc839b4b45a5e422b09141e08b00792", 0x23}, {&(0x7f00000001c0)="ea8a171262d4f556fe61d77fc60220be19e78c1ef8d362540b13e2d39835d29d73bfccc063eacbe8d611ee076dbddbf5066c76c8253594f3e7620d436db24c8c10058e01f7b449b1e482fa0836fc7936b7a35a37ed88d6ffa068f1fd6da853fcbf0a721eb9243603187af3b9afca56e42aa4fbe3f0aecad67e1ac1f7ab552422860f1d036768b23efc3f5cad89f3603c816943af47a4ac562181516893d1975730042fbcc7fc316b40", 0xa9}, {&(0x7f0000000280)="467a5bfbdeafcdd9561e54052f452848e9b99ce11ea44246741b840d0c318aaa5995717d76b246b59f11cca1d9947b1096a3f5e955cd72021245295ff411017eb549b360b4705c6abd22a2f9dcc013fab6cd3603b8763f4925ed2fd1ebea19c5a86e6875c79ac05e88a6c467011bf1515e81bb3823d8aec712b4cafd75d0ff785d9c6d17b2e8738cb1a516af0482234d42acb3da0ebd51df255687abb7c356f1a32ecca873ac5120d16af984a181eac9c31ba8439d2f6db54589e5570a7d5e0c44c025b4bb2b6b3ada", 0xc9}, {&(0x7f0000000380)="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", 0x1000}], 0x6, 0x0, 0x0, 0x40000}, 0x0) syz_io_uring_setup(0xe1, &(0x7f0000001600)={0x0, 0x1016, 0x1, 0x1, 0x2fe, 0x0, r1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001680)=0x0, &(0x7f00000016c0)) r5 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r8, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r5, 0x0) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r5, 0x8000000) syz_io_uring_submit(r9, r7, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000001700)={{0x1, 0x1, 0x18, r0, {0x6, 0x1}}, './file0\x00'}) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r7, &(0x7f0000001740)=@IORING_OP_READ_FIXED={0x4, 0x3, 0x0, @fd=r10, 0x0, 0x20, 0x3f, 0x5, 0x0, {0x1, r11}}, 0x2) 05:20:34 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x684e2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000000, 0x30, r0, 0x10000000) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000005, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x1000009, 0xffffffffffffffff) [ 1094.117412] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8854 comm=syz-executor.4 [ 1094.142377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8856 comm=syz-executor.4 05:20:34 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fd"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:34 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:34 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:34 executing program 7: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="6c6500cf000000704ac9dde93000"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat2(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x444002, 0x2}, 0x18) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{}, {0x77359400}}) openat(r1, &(0x7f0000000180)='./file0\x00', 0x84400, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000580)) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000280), 0x561001, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(0xffffffffffffffff, 0x3312, 0x8) fsmount(r1, 0x1, 0x8a) ioctl$FIGETBSZ(r3, 0x2, &(0x7f00000002c0)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f00000004c0)) mount$cgroup(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x2812020, &(0x7f0000000400)=ANY=[@ANYBLOB="6e616d653d2f6465762f736e617073686f74002c6e616d653d68756765746c622c616c6c2c6e6f6e652c6370757365745f76325f6d6f64652c78617474722c6e6f7072656669782c636cdfe7af084ab5f43bf36f6e655f6365746c622c66736e616d653d2f6465762f7a65726f002c736d61636b6673666c6f6f723d2e282b2d5e2c6f626a5f726f6c653d5e282c00c01bb33846a64ba66b96d1f8bafc523e011c45bb8386b1254b86bb32f5b5b695499776"]) [ 1094.441805] cgroup: Invalid name 05:20:50 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 05:20:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:20:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1109.691329] 9pnet: Insufficient options for proto=fd 05:20:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) inotify_init() openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x10041, 0x14) r3 = openat(0xffffffffffffff9c, 0x0, 0x80042, 0x0) io_setup(0x20000006, &(0x7f0000000240)) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0xff, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x2, r2}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c00d236b33c036a0491522fe0ab6e0000000e0423b3383401040000000000002b5c9f3189a4c66967e6dbec562eec74aa9a2290702de5eb4366cac100"]) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f0000001440)={0x0, 0x4, [0x1, 0x0, 0x3, 0x0, 0x1100000000, 0xffff]}) open_by_handle_at(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000020000000002009301040000890000000ffbffff0700000002000000"], 0x2000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000440)={0x0, 0x0, "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", "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"}) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) ioctl$BTRFS_IOC_SNAP_DESTROY(0xffffffffffffffff, 0x5000940f, &(0x7f0000000940)={{}, "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"}) lseek(r2, 0x7, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_proto_private(r4, 0x89e0, &(0x7f0000000340)) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) [ 1109.732045] 9pnet: Insufficient options for proto=fd 05:20:50 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fd"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:20:50 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:20:50 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1109.766775] FAULT_INJECTION: forcing a failure. [ 1109.766775] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1109.767980] CPU: 1 PID: 8898 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1109.768615] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1109.769407] Call Trace: [ 1109.769672] dump_stack+0x107/0x167 [ 1109.770035] should_fail.cold+0x5/0xa [ 1109.770407] _copy_from_user+0x2e/0x1b0 [ 1109.770782] copy_clone_args_from_user+0x147/0x790 [ 1109.771249] ? __lockdep_reset_lock+0x180/0x180 [ 1109.771693] ? sighand_ctor+0x40/0x40 [ 1109.772056] ? find_held_lock+0x2c/0x110 [ 1109.772449] ? ksys_write+0x21a/0x260 [ 1109.772810] ? lock_downgrade+0x6d0/0x6d0 [ 1109.773206] __do_sys_clone3+0x9d/0x320 [ 1109.773579] ? __do_sys_clone+0x110/0x110 [ 1109.773981] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1109.774438] ? wait_for_completion_io+0x270/0x270 [ 1109.774895] ? rcu_read_lock_any_held+0x75/0xa0 [ 1109.775327] ? vfs_write+0x354/0xa70 [ 1109.775682] ? fput_many+0x2f/0x1a0 [ 1109.776026] ? ksys_write+0x1a9/0x260 [ 1109.776392] ? __ia32_sys_read+0xb0/0xb0 [ 1109.776778] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1109.777263] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1109.777755] ? trace_hardirqs_on+0x5b/0x180 [ 1109.778166] do_syscall_64+0x33/0x40 [ 1109.778518] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1109.779000] RIP: 0033:0x7f33add2bb19 [ 1109.779351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1109.781055] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1109.781816] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1109.782480] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1109.783140] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1109.783807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1109.784465] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:20:50 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) 05:20:50 executing program 7: prctl$PR_SET_IO_FLUSHER(0x39, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x1001000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\x00') mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x20, 0x0) 05:20:50 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fd"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1109.976557] FAULT_INJECTION: forcing a failure. [ 1109.976557] name failslab, interval 1, probability 0, space 0, times 1 [ 1109.978808] CPU: 0 PID: 8904 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1109.979987] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1109.981407] Call Trace: [ 1109.981877] dump_stack+0x107/0x167 [ 1109.982514] should_fail.cold+0x5/0xa [ 1109.983175] ? copy_process+0x3285/0x7800 [ 1109.983896] should_failslab+0x5/0x20 [ 1109.984557] kmem_cache_alloc_node+0x55/0x330 [ 1109.985322] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1109.986228] copy_process+0x3285/0x7800 [ 1109.986910] ? __lockdep_reset_lock+0x180/0x180 [ 1109.987681] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1109.988566] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1109.989488] ? lock_acquire+0x197/0x470 [ 1109.990171] ? find_held_lock+0x2c/0x110 [ 1109.990879] ? __cleanup_sighand+0xb0/0xb0 [ 1109.991616] ? _copy_from_user+0xfb/0x1b0 [ 1109.992328] kernel_clone+0xe7/0x980 [ 1109.992957] ? __lockdep_reset_lock+0x180/0x180 [ 1109.993754] ? create_io_thread+0xf0/0xf0 [ 1109.994481] ? ksys_write+0x21a/0x260 [ 1109.995122] ? lock_downgrade+0x6d0/0x6d0 [ 1109.995813] __do_sys_clone3+0x1e5/0x320 [ 1109.996499] ? __do_sys_clone+0x110/0x110 [ 1109.997227] ? rcu_read_lock_any_held+0x75/0xa0 [ 1109.998027] ? vfs_write+0x354/0xa70 [ 1109.998665] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1109.999443] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1110.000353] ? ksys_write+0x1a9/0x260 [ 1110.001001] ? __ia32_sys_read+0xb0/0xb0 [ 1110.001691] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1110.002578] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1110.003438] ? trace_hardirqs_on+0x5b/0x180 [ 1110.004170] do_syscall_64+0x33/0x40 [ 1110.004793] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1110.005646] RIP: 0033:0x7f33add2bb19 [ 1110.006278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1110.009324] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1110.010599] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1110.011785] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1110.012966] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1110.014141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1110.015298] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:20:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x1010, r1, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000900)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r2, 0x0, &(0x7f00000008c0)={&(0x7f00000005c0)=@nfc_llcp, 0x80, &(0x7f0000000240)=[{&(0x7f0000000640)=""/240, 0xf0}, {&(0x7f0000000740)=""/77, 0x4d}, {&(0x7f00000007c0)=""/90, 0x5a}], 0x3, &(0x7f0000000840)=""/89, 0x59}, 0x0, 0x40010042, 0x1, {0x1, r4}}, 0x401) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007500)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000007600)=0xe8) sendmsg$nl_xfrm(r2, &(0x7f0000007840)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000007800)={&(0x7f0000007640)=@delpolicy={0x198, 0x14, 0x4, 0x70bd2d, 0x25dfdbfe, {{@in6=@empty, @in6=@loopback, 0x4e23, 0x0, 0x4e22, 0x101, 0x2, 0x20, 0x80, 0x2e, r5, 0xee01}, 0x0, 0x2}, [@policy={0xac, 0x7, {{@in=@loopback, @in6=@mcast2, 0x4e24, 0x400, 0x4e21, 0x1, 0x2, 0x0, 0x80, 0x2b, 0x0, 0xee01}, {0x8, 0x9, 0xb4dc, 0x100000001, 0x1, 0x8000, 0x6, 0x7}, {0x8, 0x10000, 0x7fffffff, 0x6}, 0x7, 0x0, 0x0, 0x1, 0x0, 0x3}}, @replay_thresh={0x8, 0xb, 0x200}, @algo_aead={0x91, 0x12, {{'echainiv(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x228, 0x80, "e21cb0693a0e60a4479606566b6c7a6915ffa3db308c83a3c17078334420a55468be55cbebf985a565af7354e20c1abcc2478289e04579aa7690edbff0f546b6c64c69f0d4"}}]}, 0x198}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="5c000000140001000000000000000000e0000002000000000000000000000000fe88000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x5c}}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3000000, 0x10010, 0xffffffffffffffff, 0x0) r7 = syz_open_pts(0xffffffffffffffff, 0x48480) r8 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r8, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) r9 = syz_io_uring_setup(0x3153, &(0x7f0000000140)={0x0, 0x34b3, 0x0, 0xfffffffd, 0x100000, 0x0, r8}, &(0x7f0000fef000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f00000000c0)=0x0) r12 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r12, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) syz_io_uring_submit(r10, r11, &(0x7f0000000000)=@IORING_OP_STATX={0x15, 0x3, 0x0, r12, &(0x7f00000004c0), &(0x7f0000000080)='./file0\x00', 0x80, 0x6000}, 0x1) r13 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r9, 0x0) r14 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r13, r11, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r14}}, 0x8001) syz_io_uring_submit(r6, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd=r7, 0x0, 0x0, 0x0, {0x80a3}, 0x0, {0x0, r14}}, 0x7) [ 1110.098723] audit: type=1400 audit(1707888050.594:150): avc: denied { map } for pid=8910 comm="syz-executor.4" path="pipe:[32952]" dev="pipefs" ino=32952 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 [ 1110.102682] audit: type=1400 audit(1707888050.594:151): avc: denied { execute } for pid=8910 comm="syz-executor.4" path="pipe:[32952]" dev="pipefs" ino=32952 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 [ 1110.104855] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1110.142232] EXT4-fs (sda): re-mounted. Opts: (null) 05:20:50 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) [ 1110.146329] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1110.172870] FAULT_INJECTION: forcing a failure. [ 1110.172870] name failslab, interval 1, probability 0, space 0, times 0 [ 1110.174069] CPU: 1 PID: 8915 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1110.174626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1110.175299] Call Trace: [ 1110.175522] dump_stack+0x107/0x167 [ 1110.175825] should_fail.cold+0x5/0xa [ 1110.176137] ? create_object.isra.0+0x3a/0xa20 [ 1110.176514] should_failslab+0x5/0x20 [ 1110.176825] kmem_cache_alloc+0x5b/0x310 [ 1110.177160] create_object.isra.0+0x3a/0xa20 [ 1110.177525] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1110.177947] kmem_cache_alloc_node+0x169/0x330 [ 1110.178325] copy_process+0x3285/0x7800 [ 1110.178655] ? __lockdep_reset_lock+0x180/0x180 [ 1110.179030] ? mark_lock+0xf5/0x2df0 [ 1110.179337] ? lock_acquire+0x197/0x470 [ 1110.179661] ? find_held_lock+0x2c/0x110 [ 1110.180000] ? __cleanup_sighand+0xb0/0xb0 [ 1110.180356] ? _copy_from_user+0xfb/0x1b0 [ 1110.180698] kernel_clone+0xe7/0x980 [ 1110.181002] ? __lockdep_reset_lock+0x180/0x180 [ 1110.181382] ? create_io_thread+0xf0/0xf0 [ 1110.181741] ? ksys_write+0x21a/0x260 [ 1110.182051] ? lock_downgrade+0x6d0/0x6d0 [ 1110.182394] __do_sys_clone3+0x1e5/0x320 [ 1110.182732] ? __do_sys_clone+0x110/0x110 [ 1110.183155] ? rcu_read_lock_any_held+0x75/0xa0 [ 1110.183560] ? vfs_write+0x354/0xa70 [ 1110.183870] ? fput_many+0x2f/0x1a0 [ 1110.184164] ? ksys_write+0x1a9/0x260 [ 1110.184473] ? __ia32_sys_read+0xb0/0xb0 [ 1110.184800] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1110.185222] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1110.185638] ? trace_hardirqs_on+0x5b/0x180 [ 1110.186000] do_syscall_64+0x33/0x40 [ 1110.186301] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1110.186717] RIP: 0033:0x7f33add2bb19 [ 1110.187019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1110.188489] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1110.189102] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1110.189675] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1110.190253] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1110.190824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1110.191398] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:20:50 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:20:50 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:50 executing program 7: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fd"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:20:50 executing program 4: unshare(0x20020000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000000140)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000180)=""/233, 0xe9, 0x20, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @mcast1, 0x7}, 0x1c) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r1, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x8, 0x8400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7ff, 0x2, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x0, 0x7, 0x8, 0x3ff, 0x20, 0x0, 0x10000, 0x0, 0x2080000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(r2, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 05:21:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:05 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x3938700}}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x8f2c}) fcntl$lock(r1, 0x25, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x1a85, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) syz_open_procfs(r3, &(0x7f0000000040)='net/xfrm_stat\x00') r4 = dup3(r0, r2, 0x80000) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0xfc, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3f, 0x1, @perf_bp={&(0x7f00000000c0), 0xc}, 0x18200, 0x9, 0x81, 0x4, 0x8, 0x800, 0x4, 0x0, 0x7, 0x0, 0x4}, r3, 0x2, r4, 0x9) 05:21:05 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) 05:21:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:21:05 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:21:05 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:21:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='romfs\x00', 0x18040c0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'veth0_to_bond\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/module/snd_seq', 0x18dd00, 0x20) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f0000000080)) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r6, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x160) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) [ 1124.884135] FAULT_INJECTION: forcing a failure. [ 1124.884135] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1124.886899] CPU: 1 PID: 8941 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1124.888097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1124.889548] Call Trace: [ 1124.890025] dump_stack+0x107/0x167 [ 1124.890684] should_fail.cold+0x5/0xa [ 1124.891361] __alloc_pages_nodemask+0x182/0x600 [ 1124.892185] ? lock_downgrade+0x6d0/0x6d0 [ 1124.892921] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1124.893990] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1124.894912] ? kmem_cache_alloc_node+0x2bc/0x330 [ 1124.895754] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1124.896686] copy_process+0x618/0x7800 [ 1124.897402] ? __lockdep_reset_lock+0x180/0x180 [ 1124.898224] ? mark_lock+0xf5/0x2df0 [ 1124.898900] ? lock_acquire+0x197/0x470 [ 1124.899597] ? find_held_lock+0x2c/0x110 [ 1124.900340] ? __cleanup_sighand+0xb0/0xb0 [ 1124.901099] ? _copy_from_user+0xfb/0x1b0 [ 1124.901849] kernel_clone+0xe7/0x980 [ 1124.902520] ? __lockdep_reset_lock+0x180/0x180 [ 1124.903362] ? create_io_thread+0xf0/0xf0 [ 1124.904108] ? ksys_write+0x21a/0x260 [ 1124.904789] ? lock_downgrade+0x6d0/0x6d0 [ 1124.905520] __do_sys_clone3+0x1e5/0x320 [ 1124.906234] ? __do_sys_clone+0x110/0x110 [ 1124.906907] ? rcu_read_lock_any_held+0x75/0xa0 [ 1124.907640] ? vfs_write+0x354/0xa70 [ 1124.908228] ? fput_many+0x2f/0x1a0 [ 1124.908806] ? ksys_write+0x1a9/0x260 [ 1124.909407] ? __ia32_sys_read+0xb0/0xb0 [ 1124.910060] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1124.910883] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1124.911689] ? trace_hardirqs_on+0x5b/0x180 [ 1124.912373] do_syscall_64+0x33/0x40 [ 1124.912962] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1124.913763] RIP: 0033:0x7f33add2bb19 [ 1124.914363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1124.917231] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1124.918452] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1124.919570] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1124.920698] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1124.921815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1124.922950] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:21:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:05 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:21:05 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) [ 1125.143708] FAULT_INJECTION: forcing a failure. [ 1125.143708] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.144964] CPU: 0 PID: 8965 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1125.145617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1125.146283] Call Trace: [ 1125.146507] dump_stack+0x107/0x167 [ 1125.146807] should_fail.cold+0x5/0xa [ 1125.147122] ? prepare_creds+0x25/0x5e0 [ 1125.147447] should_failslab+0x5/0x20 [ 1125.147758] kmem_cache_alloc+0x5b/0x310 [ 1125.148090] ? lock_downgrade+0x6d0/0x6d0 [ 1125.148427] prepare_creds+0x25/0x5e0 [ 1125.148735] copy_creds+0x72/0x580 [ 1125.149030] copy_process+0xfdc/0x7800 [ 1125.149350] ? __lockdep_reset_lock+0x180/0x180 [ 1125.149721] ? mark_lock+0xf5/0x2df0 [ 1125.150035] ? lock_acquire+0x197/0x470 [ 1125.150356] ? find_held_lock+0x2c/0x110 [ 1125.150696] ? __cleanup_sighand+0xb0/0xb0 [ 1125.151048] ? _copy_from_user+0xfb/0x1b0 [ 1125.151387] kernel_clone+0xe7/0x980 [ 1125.151693] ? __lockdep_reset_lock+0x180/0x180 [ 1125.152071] ? create_io_thread+0xf0/0xf0 [ 1125.152413] ? ksys_write+0x21a/0x260 [ 1125.152722] ? lock_downgrade+0x6d0/0x6d0 [ 1125.153062] __do_sys_clone3+0x1e5/0x320 [ 1125.153391] ? __do_sys_clone+0x110/0x110 [ 1125.153739] ? rcu_read_lock_any_held+0x75/0xa0 [ 1125.154118] ? vfs_write+0x354/0xa70 [ 1125.154422] ? fput_many+0x2f/0x1a0 [ 1125.154723] ? ksys_write+0x1a9/0x260 [ 1125.155033] ? __ia32_sys_read+0xb0/0xb0 [ 1125.155363] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1125.155783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1125.156197] ? trace_hardirqs_on+0x5b/0x180 [ 1125.156548] do_syscall_64+0x33/0x40 [ 1125.156851] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1125.157266] RIP: 0033:0x7f33add2bb19 [ 1125.157572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1125.159034] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1125.159648] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1125.160219] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1125.160785] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1125.161356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1125.161931] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:21:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:05 executing program 4: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000300)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c0100000000000000262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de6000000000000000000", 0x92, 0x3}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x8000, &(0x7f0000000180)=ANY=[]) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000002c0)={0x1ff4, 0x7, 0xd29, 0x1ff}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/snmp6\x00') pidfd_getfd(r5, 0xffffffffffffffff, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x20043, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r6, 0x8040942d, &(0x7f0000000180)) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x600, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0) 05:21:05 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:21:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000080000d9f4655fdaf2655fdaf4655f000000000000060004", 0x1d, 0x2200}], 0x30000, &(0x7f0000000280)=ANY=[]) chroot(&(0x7f0000000180)='./file0\x00') umount2(&(0x7f0000000140)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x20, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 05:21:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1125.379527] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 05:21:05 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) [ 1125.482879] FAULT_INJECTION: forcing a failure. [ 1125.482879] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.483964] CPU: 0 PID: 8993 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1125.484523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1125.485186] Call Trace: [ 1125.485406] dump_stack+0x107/0x167 [ 1125.485708] should_fail.cold+0x5/0xa [ 1125.486028] ? create_object.isra.0+0x3a/0xa20 [ 1125.486399] should_failslab+0x5/0x20 [ 1125.486711] kmem_cache_alloc+0x5b/0x310 [ 1125.487044] create_object.isra.0+0x3a/0xa20 [ 1125.487411] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1125.487833] kmem_cache_alloc+0x159/0x310 [ 1125.488176] prepare_creds+0x25/0x5e0 [ 1125.488495] copy_creds+0x72/0x580 [ 1125.488791] copy_process+0xfdc/0x7800 [ 1125.489109] ? __lockdep_reset_lock+0x180/0x180 [ 1125.489499] ? mark_lock+0xf5/0x2df0 [ 1125.489812] ? lock_acquire+0x197/0x470 [ 1125.490145] ? find_held_lock+0x2c/0x110 [ 1125.490484] ? __cleanup_sighand+0xb0/0xb0 [ 1125.490833] ? _copy_from_user+0xfb/0x1b0 [ 1125.491172] kernel_clone+0xe7/0x980 [ 1125.491478] ? __lockdep_reset_lock+0x180/0x180 [ 1125.491853] ? create_io_thread+0xf0/0xf0 [ 1125.492198] ? ksys_write+0x21a/0x260 [ 1125.492505] ? lock_downgrade+0x6d0/0x6d0 [ 1125.492842] __do_sys_clone3+0x1e5/0x320 [ 1125.493175] ? __do_sys_clone+0x110/0x110 [ 1125.493522] ? rcu_read_lock_any_held+0x75/0xa0 [ 1125.493897] ? vfs_write+0x354/0xa70 [ 1125.494205] ? fput_many+0x2f/0x1a0 [ 1125.494501] ? ksys_write+0x1a9/0x260 [ 1125.494807] ? __ia32_sys_read+0xb0/0xb0 [ 1125.495136] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1125.495562] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1125.495975] ? trace_hardirqs_on+0x5b/0x180 [ 1125.496332] do_syscall_64+0x33/0x40 [ 1125.496633] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1125.497042] RIP: 0033:0x7f33add2bb19 [ 1125.497342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1125.498814] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1125.499427] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1125.499995] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1125.500570] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1125.501140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1125.501711] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:21:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:20 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:20 executing program 4: r0 = gettid() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000600)={0x3060180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000180)) socket$inet(0x2, 0x1, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r1, 0x9e46, 0x0) getdents64(r1, &(0x7f0000001400)=""/53, 0x35) 05:21:20 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) 05:21:20 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:21:20 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:21:20 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1140.312933] FAULT_INJECTION: forcing a failure. [ 1140.312933] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.314925] CPU: 1 PID: 9016 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1140.315910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1140.317094] Call Trace: [ 1140.317486] dump_stack+0x107/0x167 [ 1140.318028] should_fail.cold+0x5/0xa [ 1140.318606] ? security_prepare_creds+0x112/0x190 [ 1140.319306] should_failslab+0x5/0x20 [ 1140.319852] __kmalloc+0x72/0x390 [ 1140.320373] security_prepare_creds+0x112/0x190 [ 1140.321056] prepare_creds+0x452/0x5e0 [ 1140.321627] copy_creds+0x72/0x580 [ 1140.322160] copy_process+0xfdc/0x7800 [ 1140.322737] ? __lockdep_reset_lock+0x180/0x180 [ 1140.323400] ? mark_lock+0xf5/0x2df0 [ 1140.323954] ? lock_acquire+0x197/0x470 [ 1140.324529] ? find_held_lock+0x2c/0x110 [ 1140.325133] ? __cleanup_sighand+0xb0/0xb0 [ 1140.325766] ? _copy_from_user+0xfb/0x1b0 [ 1140.326372] kernel_clone+0xe7/0x980 [ 1140.326910] ? __lockdep_reset_lock+0x180/0x180 [ 1140.327578] ? create_io_thread+0xf0/0xf0 [ 1140.328196] ? ksys_write+0x21a/0x260 [ 1140.328763] ? lock_downgrade+0x6d0/0x6d0 [ 1140.329358] __do_sys_clone3+0x1e5/0x320 [ 1140.329951] ? __do_sys_clone+0x110/0x110 [ 1140.330598] ? rcu_read_lock_any_held+0x75/0xa0 [ 1140.331269] ? vfs_write+0x354/0xa70 [ 1140.331808] ? fput_many+0x2f/0x1a0 [ 1140.332343] ? ksys_write+0x1a9/0x260 [ 1140.332888] ? __ia32_sys_read+0xb0/0xb0 [ 1140.333480] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1140.334233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1140.334969] ? trace_hardirqs_on+0x5b/0x180 [ 1140.335603] do_syscall_64+0x33/0x40 [ 1140.336141] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1140.336874] RIP: 0033:0x7f33add2bb19 [ 1140.337417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1140.340016] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1140.341107] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1140.342150] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1140.343245] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1140.344307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1140.345414] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:21:20 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:20 executing program 4: unshare(0x8000000) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) 05:21:21 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) [ 1140.644599] FAULT_INJECTION: forcing a failure. [ 1140.644599] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.646603] CPU: 0 PID: 9032 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1140.647660] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1140.648955] Call Trace: [ 1140.649388] dump_stack+0x107/0x167 [ 1140.649984] should_fail.cold+0x5/0xa [ 1140.650615] ? create_object.isra.0+0x3a/0xa20 [ 1140.651333] should_failslab+0x5/0x20 [ 1140.651930] kmem_cache_alloc+0x5b/0x310 [ 1140.652572] create_object.isra.0+0x3a/0xa20 [ 1140.653258] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1140.654085] __kmalloc+0x16e/0x390 [ 1140.654670] security_prepare_creds+0x112/0x190 [ 1140.655416] prepare_creds+0x452/0x5e0 [ 1140.656028] copy_creds+0x72/0x580 [ 1140.656591] copy_process+0xfdc/0x7800 [ 1140.657214] ? __lockdep_reset_lock+0x180/0x180 [ 1140.657960] ? mark_lock+0xf5/0x2df0 [ 1140.658563] ? lock_acquire+0x197/0x470 [ 1140.659183] ? find_held_lock+0x2c/0x110 [ 1140.659845] ? __cleanup_sighand+0xb0/0xb0 [ 1140.660554] ? _copy_from_user+0xfb/0x1b0 [ 1140.661205] kernel_clone+0xe7/0x980 [ 1140.661795] ? __lockdep_reset_lock+0x180/0x180 [ 1140.662555] ? create_io_thread+0xf0/0xf0 [ 1140.663221] ? ksys_write+0x21a/0x260 [ 1140.663825] ? lock_downgrade+0x6d0/0x6d0 [ 1140.664474] __do_sys_clone3+0x1e5/0x320 [ 1140.665103] ? __do_sys_clone+0x110/0x110 [ 1140.665769] ? rcu_read_lock_any_held+0x75/0xa0 [ 1140.666499] ? vfs_write+0x354/0xa70 [ 1140.667080] ? fput_many+0x2f/0x1a0 [ 1140.667662] ? ksys_write+0x1a9/0x260 [ 1140.668290] ? __ia32_sys_read+0xb0/0xb0 [ 1140.668934] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1140.669764] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1140.670565] ? trace_hardirqs_on+0x5b/0x180 [ 1140.671241] do_syscall_64+0x33/0x40 [ 1140.671813] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1140.672601] RIP: 0033:0x7f33add2bb19 [ 1140.673175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1140.676051] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1140.677258] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1140.678359] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1140.679507] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1140.680686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1140.681834] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:21:21 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:21:21 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:21 executing program 4: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\"\x00\x00\x00./file0\x00']) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000001", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r1) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000080)=0x1f3, 0x4, 0x7) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, 0xffffffffffffffff) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'veth0_to_bond\x00'}) readv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, 0xffffffffffffffff) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 05:21:21 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:21:21 executing program 7: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000100000876000000", @ANYRES32=r0, @ANYBLOB="06000000000000002e2f66696c653100"]) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,uname={,version=9p2000,obj_type={{^$,uid>', @ANYRESDEC=r1, @ANYBLOB="3e65bb6d643c", @ANYRESDEC=r1, @ANYBLOB=',hash,permit_directio,appraise,appraise,obj_type=@&[&,\x00']) r2 = open$dir(&(0x7f0000000440)='./file1\x00', 0x48000, 0x3) copy_file_range(r2, 0x0, r0, &(0x7f00000004c0)=0x9, 0x3, 0x0) syz_open_dev$vcsn(0x0, 0x4, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000740)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x800, 0x40) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r4}}, './file1\x00'}) accept$unix(r5, &(0x7f0000000580), &(0x7f0000000600)=0x6e) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0xc, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 1141.330186] 9pnet: p9_fd_create_tcp (9045): problem connecting socket to 127.0.0.1 05:21:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:21:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) write(r3, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(r1, &(0x7f0000001540)='totmaps\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000014c0)='./file0/file0\x00', &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000080)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x130000, &(0x7f0000000440)=ANY=[]) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x2, 0x0, @fd_index=0x8, 0x1, 0x0, 0x0, 0x0, 0x1, {0x0, r5}}, 0x8) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='io\x00') unshare(0x48020200) 05:21:36 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:21:36 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 05:21:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:36 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:21:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1156.400788] FAULT_INJECTION: forcing a failure. [ 1156.400788] name failslab, interval 1, probability 0, space 0, times 0 [ 1156.402935] CPU: 0 PID: 9072 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1156.403960] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1156.405218] Call Trace: [ 1156.405634] dump_stack+0x107/0x167 [ 1156.406212] should_fail.cold+0x5/0xa [ 1156.406817] ? create_user_ns+0x1b4/0xab0 [ 1156.407463] should_failslab+0x5/0x20 [ 1156.408062] kmem_cache_alloc+0x5b/0x310 [ 1156.408746] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1156.409540] create_user_ns+0x1b4/0xab0 [ 1156.410167] copy_creds+0x409/0x580 [ 1156.410744] copy_process+0xfdc/0x7800 [ 1156.411345] ? __lockdep_reset_lock+0x180/0x180 [ 1156.412063] ? mark_lock+0xf5/0x2df0 [ 1156.412648] ? lock_acquire+0x197/0x470 [ 1156.413260] ? find_held_lock+0x2c/0x110 [ 1156.413907] ? __cleanup_sighand+0xb0/0xb0 [ 1156.414597] ? _copy_from_user+0xfb/0x1b0 [ 1156.415249] kernel_clone+0xe7/0x980 [ 1156.415825] ? __lockdep_reset_lock+0x180/0x180 [ 1156.416543] ? create_io_thread+0xf0/0xf0 [ 1156.417203] ? ksys_write+0x21a/0x260 [ 1156.417793] ? lock_downgrade+0x6d0/0x6d0 [ 1156.418450] __do_sys_clone3+0x1e5/0x320 [ 1156.419075] ? __do_sys_clone+0x110/0x110 [ 1156.419737] ? rcu_read_lock_any_held+0x75/0xa0 [ 1156.420451] ? vfs_write+0x354/0xa70 [ 1156.421033] ? fput_many+0x2f/0x1a0 [ 1156.421597] ? ksys_write+0x1a9/0x260 [ 1156.422189] ? __ia32_sys_read+0xb0/0xb0 [ 1156.422831] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1156.423639] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1156.424427] ? trace_hardirqs_on+0x5b/0x180 [ 1156.425096] do_syscall_64+0x33/0x40 [ 1156.425671] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1156.426460] RIP: 0033:0x7f33add2bb19 [ 1156.427033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1156.429826] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1156.430995] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1156.432078] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1156.433164] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1156.434260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1156.435348] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:21:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:21:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = syz_io_uring_setup(0x263d, 0x0, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x3, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_TIMEOUT_REMOVE, 0x2) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x2000, 0x0, {0xb}}, 0x14}}, 0x40040) recvmmsg(r3, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd_index=0x8, 0x8, {}, 0xe374, 0x7, 0x0, {0x0, r2, r3}}, 0x9) fsmount(0xffffffffffffffff, 0x0, 0x88) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x404) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r5, 0x1000004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r6, r5, 0x0, 0x404) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 05:21:37 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) 05:21:37 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1156.695554] FAULT_INJECTION: forcing a failure. [ 1156.695554] name failslab, interval 1, probability 0, space 0, times 0 [ 1156.697667] CPU: 1 PID: 9182 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1156.698790] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1156.700144] Call Trace: [ 1156.700581] dump_stack+0x107/0x167 [ 1156.701184] should_fail.cold+0x5/0xa [ 1156.701809] ? create_object.isra.0+0x3a/0xa20 [ 1156.702579] should_failslab+0x5/0x20 [ 1156.703204] kmem_cache_alloc+0x5b/0x310 [ 1156.703872] ? mntput+0x67/0x90 [ 1156.704417] create_object.isra.0+0x3a/0xa20 [ 1156.705138] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1156.705968] kmem_cache_alloc+0x159/0x310 [ 1156.706677] create_user_ns+0x1b4/0xab0 [ 1156.707339] copy_creds+0x409/0x580 [ 1156.707934] copy_process+0xfdc/0x7800 [ 1156.708571] ? __lockdep_reset_lock+0x180/0x180 [ 1156.709322] ? mark_lock+0xf5/0x2df0 [ 1156.709936] ? lock_acquire+0x197/0x470 [ 1156.710601] ? find_held_lock+0x2c/0x110 [ 1156.711286] ? __cleanup_sighand+0xb0/0xb0 [ 1156.712008] ? _copy_from_user+0xfb/0x1b0 [ 1156.712701] kernel_clone+0xe7/0x980 [ 1156.713282] ? __lockdep_reset_lock+0x180/0x180 [ 1156.714038] ? create_io_thread+0xf0/0xf0 [ 1156.714751] ? ksys_write+0x21a/0x260 [ 1156.715379] ? lock_downgrade+0x6d0/0x6d0 [ 1156.716068] __do_sys_clone3+0x1e5/0x320 [ 1156.716736] ? __do_sys_clone+0x110/0x110 [ 1156.717436] ? rcu_read_lock_any_held+0x75/0xa0 [ 1156.718195] ? vfs_write+0x354/0xa70 [ 1156.718821] ? fput_many+0x2f/0x1a0 [ 1156.719423] ? ksys_write+0x1a9/0x260 [ 1156.720044] ? __ia32_sys_read+0xb0/0xb0 [ 1156.720712] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1156.721564] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1156.722407] ? trace_hardirqs_on+0x5b/0x180 [ 1156.723116] do_syscall_64+0x33/0x40 [ 1156.723727] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1156.724555] RIP: 0033:0x7f33add2bb19 [ 1156.725166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1156.728156] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1156.729403] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1156.730590] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1156.731746] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1156.732912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1156.734068] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:21:37 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:21:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$msdos(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x3f, 0x3, &(0x7f0000000680)=[{&(0x7f0000000400)="c5f66d53202b2a0a2e70bbc9db0cc660d36d6d5f", 0x14, 0xfffffffffffff801}, {&(0x7f0000000440)="d886acbe7aaa0125ec513b17bd87818cbd710f64dac602", 0x17, 0xfff}, {&(0x7f00000005c0)="45770d92c7baf3858b4e2a0fa1ef88f785724ef16f925d0e8bf9ada964879682bcf5d186a265cd7a226cc5589fc7eab9dc40b40a78837d1940f25ff75e3e295991fd6f5d5f372ed09bfff65cd07e27aee5ae7df046d33a872003650f55034bf5acc7c27cc69e0655f19da493f2451ea29c131b155c85a5843541eb45c85d92031d1fd3f0755bd716e14e7fc2d61dbc8fcaf3cba1916561c924a8061e29da", 0x9e, 0x20}], 0x10, &(0x7f0000000700)={[{@fat=@check_normal}, {@nodots}, {@nodots}], [{@subj_type={'subj_type', 0x3d, '+}!]'}}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) syz_open_procfs(r3, &(0x7f0000000040)='net/xfrm_stat\x00') syz_open_procfs(r3, &(0x7f0000000740)='map_files\x00') write(r2, &(0x7f0000000480)="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", 0x10e) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r5, 0xffff) sendfile(r0, r1, 0x0, 0x20d315) r6 = accept4$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c, 0x800) read(r6, &(0x7f00000002c0)=""/189, 0xbd) [ 1157.063673] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1157.091975] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. 05:21:37 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:21:37 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:21:54 executing program 3: umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:21:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:21:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:54 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:21:54 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) 05:21:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x10001, 0x6}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() ptrace(0x10, r0) ptrace(0x4208, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) syz_open_procfs(r2, &(0x7f0000000040)='net/xfrm_stat\x00') waitid(0x0, r2, &(0x7f0000000180), 0x80000000, &(0x7f0000000240)) tgkill(r2, r2, 0x1b) ptrace$setopts(0x4206, r1, 0x3f, 0x20) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x82, 0x0, 0x52, 0x43, 0x0, 0x45f6, 0x20, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xffffffffffffffe0, 0x5}, 0x8, 0x35, 0x577c, 0x69588ac4f503067f, 0x2, 0x8, 0x5, 0x0, 0x9}, r0, 0xb, 0xffffffffffffffff, 0x1) 05:21:54 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1174.034109] FAULT_INJECTION: forcing a failure. 05:21:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1174.034109] name failslab, interval 1, probability 0, space 0, times 0 [ 1174.036695] CPU: 0 PID: 9218 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1174.037754] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1174.039081] Call Trace: [ 1174.039525] dump_stack+0x107/0x167 [ 1174.040130] should_fail.cold+0x5/0xa [ 1174.040745] should_failslab+0x5/0x20 [ 1174.041371] __kmalloc_track_caller+0x79/0x370 [ 1174.042102] ? setup_userns_sysctls+0x4d/0x180 [ 1174.042886] kmemdup+0x23/0x50 [ 1174.043418] setup_userns_sysctls+0x4d/0x180 [ 1174.044123] create_user_ns+0x691/0xab0 [ 1174.044783] copy_creds+0x409/0x580 [ 1174.045379] copy_process+0xfdc/0x7800 [ 1174.046024] ? __lockdep_reset_lock+0x180/0x180 [ 1174.046795] ? mark_lock+0xf5/0x2df0 [ 1174.047402] ? lock_acquire+0x197/0x470 [ 1174.048033] ? find_held_lock+0x2c/0x110 [ 1174.048727] ? __cleanup_sighand+0xb0/0xb0 [ 1174.049444] ? _copy_from_user+0xfb/0x1b0 [ 1174.050110] kernel_clone+0xe7/0x980 [ 1174.050721] ? __lockdep_reset_lock+0x180/0x180 [ 1174.051492] ? create_io_thread+0xf0/0xf0 [ 1174.052171] ? ksys_write+0x21a/0x260 [ 1174.052775] ? lock_downgrade+0x6d0/0x6d0 [ 1174.053471] __do_sys_clone3+0x1e5/0x320 [ 1174.054125] ? __do_sys_clone+0x110/0x110 [ 1174.054808] ? rcu_read_lock_any_held+0x75/0xa0 [ 1174.055559] ? vfs_write+0x354/0xa70 [ 1174.056180] ? fput_many+0x2f/0x1a0 [ 1174.056777] ? ksys_write+0x1a9/0x260 [ 1174.057388] ? __ia32_sys_read+0xb0/0xb0 [ 1174.058039] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1174.058909] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1174.059725] ? trace_hardirqs_on+0x5b/0x180 [ 1174.060435] do_syscall_64+0x33/0x40 [ 1174.061045] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1174.061879] RIP: 0033:0x7f33add2bb19 [ 1174.062481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1174.065393] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1174.066613] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1174.067757] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1174.068918] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1174.070058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1174.071199] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:21:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0xbac25b3d391561c2, 0xffffffffffffffff) r2 = openat$incfs(r0, &(0x7f0000000100)='.pending_reads\x00', 0x44a000, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff7fff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x800}}, './file0\x00'}) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(r4, 0x406, r1) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x9) syz_open_dev$char_usb(0xc, 0xb4, 0x200000000000007) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg2\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r3, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x75, 0x2, 0x4, 0x0, 0x2, 0x6, 0x3f, 0x115, 0x40, 0x396, 0x0, 0x0, 0x38, 0x2, 0x8001, 0xa009, 0x875a}, [{0x6, 0x1, 0x8f, 0x9, 0x1ff, 0x3, 0xeaf4, 0xffff}, {0x1, 0x40, 0x1, 0x1, 0x100000000, 0x200, 0x8, 0xc0}], "a303c8c8032d7f421e815830c92c2a4003398366382c2ada850861ade9f30098ebd4438a11832c2781eb7a4802ec6b479e21f5b6d8d3a882c8cc1e41d836ffa80a629b5cc1fb358417662a7dfa9ab0b75694e7e2e2b48fc4ddeaf206469c89b7d460403320bb0b7d7c3d0b1c28dd114216820561de0d27694949ef8a8d46ceb4d08ebc3889c53e8a5a181bb7cbba8d72aaec8c1e28a7995811fe02bd1b65ced4e2199fed6abf7106cd3d26cc1bf4f8db6a107944b92a3992028179836692bb252e2ce02b1dab97224d33a05c4294f14c2cfc", ['\x00']}, 0x282) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="140001001d000200000000000000c861c1000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 05:21:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:54 executing program 3: umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:21:54 executing program 7: r0 = syz_io_uring_setup(0x52dc, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000740)={0x0, 0x0, 0x30, 0x3, 0x3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f00000000c0), 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x100000d, 0x10010, r3, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 05:21:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x10402, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c74657200000000080000000000000000000000000000000000000000000400000000000000000000000100000000000000000000000000008000000000000000fcff0000000000000000000000000000000000000000000000000000000000000e7471c78eee5047ef01a2079f11950a12b2b564c5f98a99fd2d916c93c4aae36e4ca9908f9f29046d1226cd5959c7714fbf59c37bba1f168da9d1120efab3a1d630e884ba1a72b066ccecb79187c4ed50289c9b667c3c2f1fa0999c53e2b2fd7228a0483152bcda5e408479f84ae6ed9edf0de7f966e9a073"], 0x68) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00', 0x0, 0x0, 0x0, [0x9, 0x5, 0x0, 0x0, 0x8000]}, &(0x7f0000000140)=0x78) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xa0d800, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) setresuid(0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x0, &(0x7f00000007c0)="3f7623c0fd5713364c901d3c", 0xc) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4, @remote}, 0x10) symlinkat(0xfffffffffffffffe, r3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) 05:21:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:21:54 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) 05:21:54 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYRES32=r0, @ANYBLOB="4983f9e6ffd7e7e7261d44778e9a1f13706510e1f84bbd5dde778881e8012af29755730a25951c28500e24b1b8347e49f3f9f63cdbce6f4ac60562bed4c13306215c0d20adeaff8066526b7decc655fda42b30aaa411072c688b773d75739e10dc", @ANYRES64=r0], 0x15b0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000002200010def627e9a0000000000000000020000009e9c8d41845545559922a7252014077369b212f041ca49c69310b570c8125e2c9fc0a5f6f7ca88693e065fc5a8071836a270b3d9d1c89a00"/91], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000100)={0x0, 0x34, 0x8, 0x1}) [ 1174.399869] FAULT_INJECTION: forcing a failure. [ 1174.399869] name failslab, interval 1, probability 0, space 0, times 0 [ 1174.401826] CPU: 0 PID: 9253 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1174.402781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1174.403903] Call Trace: [ 1174.404275] dump_stack+0x107/0x167 [ 1174.404792] should_fail.cold+0x5/0xa [ 1174.405318] ? create_object.isra.0+0x3a/0xa20 [ 1174.405944] should_failslab+0x5/0x20 [ 1174.406472] kmem_cache_alloc+0x5b/0x310 [ 1174.407028] ? create_user_ns+0x5b8/0xab0 [ 1174.407634] create_object.isra.0+0x3a/0xa20 [ 1174.408240] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1174.408951] __kmalloc_track_caller+0x177/0x370 [ 1174.409600] ? setup_userns_sysctls+0x4d/0x180 [ 1174.410236] kmemdup+0x23/0x50 [ 1174.410687] setup_userns_sysctls+0x4d/0x180 [ 1174.411288] create_user_ns+0x691/0xab0 [ 1174.411844] copy_creds+0x409/0x580 [ 1174.412357] copy_process+0xfdc/0x7800 [ 1174.412889] ? __lockdep_reset_lock+0x180/0x180 [ 1174.413522] ? mark_lock+0xf5/0x2df0 [ 1174.414038] ? lock_acquire+0x197/0x470 [ 1174.414612] ? find_held_lock+0x2c/0x110 [ 1174.415181] ? __cleanup_sighand+0xb0/0xb0 [ 1174.415769] ? _copy_from_user+0xfb/0x1b0 [ 1174.416338] kernel_clone+0xe7/0x980 [ 1174.416846] ? __lockdep_reset_lock+0x180/0x180 [ 1174.417481] ? create_io_thread+0xf0/0xf0 [ 1174.418057] ? ksys_write+0x21a/0x260 [ 1174.418582] ? lock_downgrade+0x6d0/0x6d0 [ 1174.419154] __do_sys_clone3+0x1e5/0x320 [ 1174.419711] ? __do_sys_clone+0x110/0x110 [ 1174.420294] ? rcu_read_lock_any_held+0x75/0xa0 [ 1174.420934] ? vfs_write+0x354/0xa70 [ 1174.420956] ? fput_many+0x2f/0x1a0 [ 1174.420974] ? ksys_write+0x1a9/0x260 [ 1174.420991] ? __ia32_sys_read+0xb0/0xb0 [ 1174.421013] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1174.421030] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1174.421044] ? trace_hardirqs_on+0x5b/0x180 [ 1174.421067] do_syscall_64+0x33/0x40 [ 1174.421083] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1174.421094] RIP: 0033:0x7f33add2bb19 [ 1174.421110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1174.421119] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1174.421138] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1174.421147] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1174.421157] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1174.421166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1174.421176] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:22:14 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:22:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:22:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:22:14 executing program 3: umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:22:14 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:22:14 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/xfrm_stat\x00') r3 = syz_open_procfs(r1, &(0x7f0000000080)='io\x00') pread64(r3, &(0x7f0000001200)=""/4103, 0x1007, 0x5b) fcntl$getown(r3, 0x9) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/keycreate\x00', 0x2, 0x0) fadvise64(r4, 0x4, 0x6, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/8, 0x8, 0x9) openat(r2, &(0x7f00000000c0)='./file1\x00', 0x50400, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x5b) openat(r0, &(0x7f00000011c0)='./file1\x00', 0x422000, 0x2) fork() 05:22:14 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) 05:22:14 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) close(r0) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x1) [ 1194.254603] FAULT_INJECTION: forcing a failure. [ 1194.254603] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.256830] CPU: 0 PID: 9278 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1194.258059] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.259543] Call Trace: [ 1194.260031] dump_stack+0x107/0x167 [ 1194.260695] should_fail.cold+0x5/0xa [ 1194.261392] ? create_object.isra.0+0x3a/0xa20 [ 1194.262213] should_failslab+0x5/0x20 [ 1194.262919] kmem_cache_alloc+0x5b/0x310 [ 1194.263656] ? create_user_ns+0x5b8/0xab0 [ 1194.264402] create_object.isra.0+0x3a/0xa20 [ 1194.265197] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1194.266123] __kmalloc_track_caller+0x177/0x370 [ 1194.266974] ? setup_userns_sysctls+0x4d/0x180 [ 1194.267811] kmemdup+0x23/0x50 [ 1194.268396] setup_userns_sysctls+0x4d/0x180 [ 1194.269176] create_user_ns+0x691/0xab0 [ 1194.269898] copy_creds+0x409/0x580 [ 1194.270543] copy_process+0xfdc/0x7800 [ 1194.271255] ? __lockdep_reset_lock+0x180/0x180 [ 1194.272099] ? mark_lock+0xf5/0x2df0 [ 1194.272786] ? lock_acquire+0x197/0x470 [ 1194.273502] ? find_held_lock+0x2c/0x110 [ 1194.274271] ? __cleanup_sighand+0xb0/0xb0 [ 1194.274313] ? _copy_from_user+0xfb/0x1b0 [ 1194.274345] kernel_clone+0xe7/0x980 [ 1194.274365] ? __lockdep_reset_lock+0x180/0x180 [ 1194.274388] ? create_io_thread+0xf0/0xf0 [ 1194.274428] ? ksys_write+0x21a/0x260 [ 1194.274449] ? lock_downgrade+0x6d0/0x6d0 [ 1194.274476] __do_sys_clone3+0x1e5/0x320 [ 1194.274497] ? __do_sys_clone+0x110/0x110 [ 1194.274543] ? rcu_read_lock_any_held+0x75/0xa0 [ 1194.274561] ? vfs_write+0x354/0xa70 [ 1194.274587] ? fput_many+0x2f/0x1a0 [ 1194.274609] ? ksys_write+0x1a9/0x260 [ 1194.274631] ? __ia32_sys_read+0xb0/0xb0 05:22:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1194.274658] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.274679] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.274704] ? trace_hardirqs_on+0x5b/0x180 [ 1194.274732] do_syscall_64+0x33/0x40 [ 1194.274751] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.274765] RIP: 0033:0x7f33add2bb19 [ 1194.274785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.274796] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1194.274819] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1194.274831] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1194.274843] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1194.274854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1194.274866] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:22:15 executing program 4: umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:22:15 executing program 4: umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:22:15 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:22:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000002040)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000000000000000000000000003800020000000000000003000000000000000a00000000000000000000000000000000000000000000f406"], 0xaf2) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) sendmmsg$inet6(r0, &(0x7f0000004f40)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0xffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6}, 0x1c, &(0x7f0000001380)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000000140)="3c03209f5f398f3cfa3db4864d3a7dca6411afa790289762632db646d2d2e61f93d396b9d814acbdeba71f6a0a427f99cd168924fb27a2cd84c2dd72e06428ec6ea8db55d508bb9ba3749f6829ad079fcedf03d02895efb8d7996e40c1fa8ee2e15efb8ef72ae34820eb27a2316249f9af010126746c1ad428a3d5a5d7612b13ff1f26933ed65cbee4135a05051517a6b69c4d3ed8fae7f0600874b913730d9fa544c0a4c29d52ef137905fde4ec49253e9f16a4e036a2ed41d1d7de66d04cd9e2dd6d0fd69b4e08e7ae1aa2637f65f9c9cb3ce24b24", 0xd6}, {&(0x7f0000000080)="f9c575243e5593b9444a8a842d", 0xd}, {&(0x7f0000001280)="25af2de32e79f9d09c696c525f1a3c1563c4c050c7312f2fd9c1b5efac2c49785b65c59af0e027fca881e47fce94fb2d7fd7a7fececfb59ce3c81567f4a9949188200b8046aa276720a321e85306a5b0a824506d6d21de22503baf2b8884b2d19113e993fb515a29fc0fd82521dd614d6416310d26164e0306d40c7b509dff3d0a02e2fa07942504121a48807de89669f7ac1ef388b9b74f6bb911a1ee87e943ae637ac1fa4a63c37db1f1a9a77988e5585317eb18cd82880345656549e48e53a16bee736374fe6a60fa5cd512d9028fc155754ffa51da3af419fe7470", 0xdd}], 0x4, &(0x7f00000020c0)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x1534e57}}, @hopopts={{0x98, 0x29, 0x36, {0x6c, 0xf, '\x00', [@padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0xd}, @pad1, @jumbo={0xc2, 0x4, 0x3}, @calipso={0x7, 0x50, {0x0, 0x12, 0x9, 0xfff, [0x54, 0x4, 0xfff, 0xffff, 0x9, 0x2, 0x4, 0x5, 0x9]}}, @calipso={0x7, 0x18, {0x1, 0x4, 0x1f, 0x1, [0xb, 0x3]}}]}}}, @dstopts={{0x10f8, 0x29, 0x37, {0xb4, 0x21b, '\x00', [@generic={0x8, 0xd2, "8d5d499b6e12b55dd79e02ea646b8af17b60b2ad643413b2002df351d4b4e02628f89accf25d2d3ad43d8962b760732287ced88fb43843bc0cab212144deeae7b90b9ed386f964421cfc85c17dc5f3b89b618cd46dfb5402bb28c2e12de80245565d66eff287b85bfaedb66387d799f301dc3c1a8d6b8e446f095f552bdf9911178556dda51613abf2c46410cdfaf9bfcbe08f7e9a2e0547ad8251fae22fdd190cf6ea5fbd500975c9118cb71d942f8a17ad4c10abaad30b6ef9ac4a01fd9e53b13ad512ed06136714b30c99c47aa4f4281d"}, @jumbo={0xc2, 0x4, 0x3}, @generic={0x7f, 0x1000, "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"}, @enc_lim={0x4, 0x1, 0x3f}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfffffffd}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x2, 0x2, '\x00', [@jumbo={0xc2, 0x4, 0x70}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @pad1, @jumbo={0xc2, 0x4, 0x7}]}}}, @rthdrdstopts={{0x148, 0x29, 0x37, {0x2f, 0x25, '\x00', [@generic={0x5, 0xf9, "30c828d68c968f0069067a1d280dd25b758340ee189dd591515c7b89b1735300c506ce7b7666f79935f8b90bfd9a0ab9f4cf232a03f1a4c3243424d8ba47beef91dcdb871100d25b310459652594e332fda89c90b82566ea9786417f06aef1938fde633a5edd18c845b13db0bc5573a1114b1de0cff44d9df4e9b7b4c95e55212169793857c129fd7b8cc3fbeecaf5d13b98dcfdd15903dac19c06e5216014f9572128e16a419786c57fa468faac2c681fc169683e685fd302157bf686d2a188ee595bcbcc544715a14744100204428963f8ebc1e7ae7d274ec756f9e15301785f8a273a0a1d195761c9c08823c47b112d06b2a65e7bd8c7f8"}, @ra={0x5, 0x2, 0x9}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @hao={0xc9, 0x10, @mcast2}, @pad1, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @pad1]}}}], 0x1338}}, {{&(0x7f00000013c0)={0xa, 0x4e23, 0xfffffffa, @mcast2, 0x200}, 0x1c, &(0x7f0000001880)=[{&(0x7f0000001400)="fc853711b4c72ffbb00b9fc497f0ebb1ee14739919c00cb02b54eb9c9230d2258468d4b1b0e751c13e2c99302b91ec5b5807d100423f8783f9c419e46aeee5faddb9345a439d8f507837e89ae33e42517c42ebc32a3615637477e23179ad64a18f0802abb88caa7b7c1261a220e817da33ad45364f4024ceea9c2884f37ec25b5be2ad42634ab03d", 0x88}, {&(0x7f00000014c0)="132e5c440e5086d7f0d4eda8eb722b5c6b337cfaf9ebd16a871b1cec1c9b1e1bccf94ec1b54e3b7cb2d8e58f42825e61354b0297af3b5e2f49542b63f9c17b4428386f299df518e04a574a9ee6a7450d03de20b9", 0x54}, {&(0x7f0000001540)="dc01167d25a0e06c9d7f67ae8c87548fe0be20001b846beacc6adc1d21a9f8449f97e6393d4b597dc4b289e29a71420d53850c2d182fe15db29368c94db0ccbb863818326dec8a41392efa1ed05adfb5bb5938a91819ea14b82fbf2bfaf2d67530dfd39db40ac3e7ddb7bafb404276676aa7ae4362951ef4ad4f927c743b0b884085cde32be4869e7bd3d53cd298c668c2496aa81e8756032362757c191c3499d3d91a823ecc6a7a554eebdd", 0xac}, {&(0x7f0000001600)="dbe95c34f6d98ea1884d322cf6a2f54b01422d6476fff30952fa50b8d170e4b09f9ac9dc3c3e5595d475ddf6f7ca4e79492946a7a920281e802fba3926c433b6217f8f5d4d838421a2e686c0be35a8415e128d77bf6a604f10847663b122ceaf0232aea39f6c7ffbac38f2c77c50d4cb6492e501a96413702dd27ae7046ce800f226f2985e98c7739488e2cbe1436332cb3017001d5a1ee188bb2e6b30", 0x9d}, {&(0x7f00000016c0)="68d7dd47166a78555f8fecabdceda51df998c30a59e5bc58bd384d2eb441cad7d6c51250f283fde3fb46f10dec843cc7ad791f6fdd3f13a1beb9453f7d2e624f7f225a46da945739723a0e04a76157019a1a7231bb695cb3ef344ff361d7722406991519a1053891845fbf3dd1d8f402d1352cf9c34652c6892330716e471f3837c56d6479d9736beb8473fe1c7300ecb34b535586b7bb67f77796c50ed2fdfcbf807987cc780ac447052239fb", 0xad}, {&(0x7f0000001780)="6363e2da0e8bd17375b614e304cd862f184fe77a1fab", 0x16}, {&(0x7f00000017c0)="7bb8f25daa0e9f1a894dcb8fbb089d1779324089319e0f47176aca90ebe771d1631e7d7fb4a7472f3c7a1efc575943b8bdc051f47e397b121688629f040264ef8c994e2564cea5896aee5a6cb64be4f3dff79a38634134fdb8b8c425de51a72527156a4f5e390f776eac4b8d3ddc7ba7add0d4a75ec74a1b32854c870d21705451210e8d2dfa1ed5b73b8cb4c71f9973a1352cd402410cbcf3531b49d554706b1ef47aee54ade854e66db2", 0xab}], 0x7}}, {{&(0x7f0000001900)={0xa, 0x4e24, 0xffffffff, @mcast1, 0x2}, 0x1c, &(0x7f0000001cc0)=[{&(0x7f0000001940)="52a778bd93518f5e6011e6bf5ab0d0b43969aefcb5fb730d0dbe8a59ec12df2a0696cf999afbc598e2851995f0004f431ffaffc098d8b39d2c59c0a8e20a86f919887145b35e7913b42f85fc338962425bae3ae4668a0ae450dd13f46f290bd7abe8398ebe14eab90a67a08c9c4441b36ac8c6be99c8a28079fc293f7d7f879dbf988ea08d48ccff5312e865ef4b71f314d0d8380d8dc7ebb2f71de5a673eb0c2ea6c6e2b96228394e7f", 0xaa}, {&(0x7f0000001a00)="19d6385e2c3569060ae355b1700389", 0xf}, {&(0x7f0000001a40)="0b90937a3233a3a7a5eea92b82bd52d086da62f6b3fe51f6", 0x18}, {&(0x7f0000001a80)="295f4d121a791f3ba480fdad01062e11a9b94ca9bbb92b84ae66365f35cc8fc46660490640badbfcd58ce8c2af70f923ffb81833db48f9d2cad3036de6e798d34cf4c3021227b6d383212d7165d0c0fcf3d94d4de9514f0c30e4b23c01fd2967e4d9d2c1d94445f0302bb95b1f0663b57df0195152a531504ddfa92d38ec", 0x7e}, {&(0x7f0000001b00)="f9fa4ffc622e0ef98d39ec41c54b4854aaba7efb08d46a68b3158a8cf57d526cc3c598c661c9ce2ca898a75373f3efb33e22814d0dccd8e8761aacf3a98aff8ea0574df57f932f5a26049c49cf89c9714f262fa5891c76bd31ad4a4e10aa20e2981c8ecd7e7f8d68af8802623d99692dc4db6d305287a3a90394d2a7aa09dd35c5d0e3b79e2b64cde40e6b0842110f5d20fa85755bae1df35d44238b53ad5338be249c07f5c8a2f25ab1c49d124737713734f165", 0xb4}, {&(0x7f0000001bc0)="2f5ad86fcfd0e04e7521c7a661d666cf89055fb73405800b7482219804543472c6d73d7746b9412c1be8543ca1973aa3f39d9780e9ca1d98a3fe9550d5289fb269159b16b4844cd68e329efefba54daa0de030398b99fe655f0eaacb0436ccdd0baf89adfa4f84d6a140bc99a8029fa30303aeda236f7a97e75dc315dce55cc88ec4814c457fcdb3979549a97a66963e1e9bd594c0a8d810fbc12aba8f512dce13c0b00e819aac9dbee0793107507255047c45980359784bac7fdd5e413746454c02782a83dc3ac3a8aa44630aefea1544374b61d1fabdf242241042d6cb6f039dda72d557bb392ff40393e592a4027400adc06d5cdad2", 0xf7}], 0x6, &(0x7f0000001d40)=[@tclass={{0x14}}, @tclass={{0x14, 0x29, 0x43, 0x4}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x32, 0x2, '\x00', [@calipso={0x7, 0x10, {0x3, 0x2, 0x1, 0xffff, [0x81]}}]}}}], 0x60}}, {{&(0x7f0000001dc0)={0xa, 0x4e20, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfffffff7}, 0x1c, &(0x7f00000045c0)=[{&(0x7f0000001e00)="0929fdcd4d788f84f8ed04d50ab124753f51d84b86aea84c8fa7667a47f577187d114e1621246c4b592310bdf3ba094fff3920ee7ebb4c78b0ef8da6ebf80fd088b540b0d84dd65e71ba1e9c5922d68df44820a052a8354aa4b1e79b4eacb7e41dc8c80d813e498c0af611271dbe60275b4dadf2d4cce20047785e753adbbadb081906d18d81abe40f7218a3c00a0573eee5aacb9e77cbed01cb2c9171d7c8d28c5ee43f0a5cf94b939a7206c16afaca29a177bba4e184aa7f1b33386fae1bbfa6adf80e7d07fab5c010d6a47954f48aad94fcc7d2b3b8b0109d571a9f849a4482be35a52a1f9baf", 0xe8}, {&(0x7f0000001f00)="2b3657a0064190f45f98f560e0c966460a97c0418336", 0x16}, {&(0x7f0000001f40)="922bc803a80a049906be700f42baee", 0xf}, {&(0x7f0000001f80)="b000bc2ddf6adc0ea854cf17c1a71b67fc1d6d574dc750aec5011dddc9831ba12fe0cd7bbb1411272dd0273cb066a7bfe76760052b2f3e259b026e1f36297bf5e57a5d060af4c5f9d53fa2905ed4259f7fc37d43b0e3409c57c5c54e0154a77fa3a99bb4c1165de99c6bd6e4faa74158a3844104120778da7fbddfb7f42a4008199342d288f4891cd393376f32ef4b6c2b63834a75", 0x95}, {&(0x7f0000003400)="15e66e61f2a4e8", 0x7}, {&(0x7f0000003440)="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", 0x1000}, {&(0x7f0000004440)="57dce4038467715c63de42698851c29f67a30622e7f9b3c69354e582f36e1478346fb32060399114d548863ca764516f6fe44f0a36b9cfdc6f33df8c93f4bc9a68b8dfea495e7a4bf01d97cdb44c6af19ffbdf096102f3178fbcdaca89660b8101c78cc92c4d27a42b75bd0a8e6a526cf73efd0c2d0b9d4bcbcceeed85b7549cda7a72a1a5a7184d3711c2b0f055b8a59a9252b913473985ec0f02486ca081c50ff00a9219d7dbb39b85e8c970908f2d0b8c2d8ccfbabf80bf660b4b05b873da1c9b8ee0500517b5668a8ef4e095b4bc9564d15da38d68b5e0c3ea541434c994015d08b5c02d7ea85985d6c7b3e7", 0xee}, {&(0x7f0000004540)="b8b617668596bd739ac5db647508ed1a493b950e8d2b19dca932be4c3ad3065355e3db74a2c41899e69b90a8505d090d6610eaae51a5d0fe6ed914391897ebe589a0c4f01e66a46dc84af30926720ab085be2c4504e07c93db0b8e8cbd3ded0c568c09a955886546f15c6c1d68452aae8330083a93444d4d2050853e3a5a", 0x7e}], 0x8, &(0x7f0000004640)=[@hoplimit={{0x14, 0x29, 0x34, 0x1c0000}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x2b, 0x2, 0x1, 0x8, 0x0, [@loopback]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x40}}, @hoplimit={{0x14, 0x29, 0x34, 0x7f}}, @hopopts_2292={{0x80, 0x29, 0x36, {0x33, 0xc, '\x00', [@enc_lim={0x4, 0x1, 0x5}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x2}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @ra={0x5, 0x2, 0x5b}, @jumbo={0xc2, 0x4, 0x80000001}, @pad1, @calipso={0x7, 0x38, {0x2, 0xc, 0x53, 0x5, [0x4c, 0x1000, 0x3, 0x3, 0x67c0, 0x3]}}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x81}}], 0x108}}, {{&(0x7f0000004780)={0xa, 0x4e20, 0x7f, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0x1c, &(0x7f0000004800)=[{&(0x7f00000047c0)}], 0x1, &(0x7f0000004840)=[@dontfrag={{0x14, 0x29, 0x3e, 0x1000}}, @rthdr_2292={{0x68, 0x29, 0x39, {0xc, 0xa, 0x1, 0xcf, 0x0, [@loopback, @private1={0xfc, 0x1, '\x00', 0x1}, @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local]}}}, @hopopts_2292={{0x200, 0x29, 0x36, {0x6c, 0x3c, '\x00', [@hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @multicast1}}, @generic={0x7, 0xdf, "5d26ab94c9f15910711bb2eb44885ae5bde008adceb5a51802ee59d7a132a244f353b38ff6811242e95c7731a5b83c59a8c89808ab860f15a4f886f38e45897e05d747a67498f48ef369d00ce593b68df4a38808d26ae213bcbee114c9e0f07d11e7e0bc0a27ab7b1a701e874c1b15f8ff1531d139cc387f2f725abcd7037643cd9959819cef22842539f24f57d5bf81fcf77e87cd110411b39f73405842379606fd0573f39c2ec60697cfa1ff212161fac134fa802923499fe9b5bca3879b127c890df2a05912e5945e3d66a44c291d54eb0709aed31f308282d4c772f507"}, @ra={0x5, 0x2, 0x3f}, @jumbo={0xc2, 0x4, 0x1}, @generic={0x6, 0xe4, "24f68b1dcc9278911d33633009b079a041db464980617f9aea07f247d45b1a302dffeaadcdceb236334cd1df1903361be91613de9f5369a7be58467a47db5d8a3e9818964503615000e5faf0ac457f1bd2498e69b2541a84751acf99d3153c42c454fc00a29ee47bcf17fe42ffd3f63ace378b02731da6000b2e3519652fb86c6eadaeecd776de76ce5186fe5f8c2198dc67d618b7612ab3ccc0b9c11492f00b54128ae18312084101ee38307cf81865ce09607fcbcfda39ac79664cee12f4c240a05641697740616f2dab69b7e426d4bc0326d24df85890f4c944619ddfcf23ab8a737f"}]}}}], 0x280}}, {{&(0x7f0000004ac0)={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, '\x00', 0x16}, 0x4}, 0x1c, &(0x7f0000004e40)=[{&(0x7f0000004b00)="c42e902e2120cbe81dfaa032ced8218d0602f6c674cd998271f41fe34fa60c0ddbd8c7e97fb4a83b2f060ba78e7a2fc177a2e7ed9ae53effd0601ea402d6e03465cdc73ca14e79ffbd73b9bbd45da54d44893f63201a6b1345f444994017e133e05b212545cd8a31de79", 0x6a}, {&(0x7f0000004b80)="d78e45561014b99666139f5927bdb3fee79ced311b750b00d8ad60d75e59826bfb642fc12ec1d256a87309c2570854baa088eee62d5b59b0a65a05423f1a6938b1c9ab7f6f767cd94ee681eebe719ca16da0734392888ebc4e755a57cafff9d57f4ac702bc84e85ee8bc48c161b6f957a6f5d05f517c6bb34dcbcdbba46b7928a447799503fd6c7dfcfc2636b6ef5f74c8f3d758bef32493172357ed326281588cc465998a3428fdc31fed0a7ef56167c9584ab050a1e07b3070211d8471a8f041476620c16d2527e658f4644d5af6ae972902e0a8246ac262573406e315eddbd1eedf0978e96dce", 0xe8}, {&(0x7f0000004c80)="6ee9529ddfcae9c219d7", 0xa}, {&(0x7f0000004cc0)="537d9c1df66ee5db1b5d2bb342dbbb0f4cbfd2063a936169e7c23c1324c34aece238f3b95c5ed89c14fb7b8d84841dca581f27a7b2bbe3c10414fa74c48f12d33ba264b608d62327032ef2a03b47e0cfcb75f4d9587b5c2e8caec94d1d54f24cf04d2981c1b4ab6ad9f9a3e66039899aea838fbf86836c67832d369f789bfab6b0", 0x81}, {&(0x7f0000004d80)="4d834fd5bf7c0d87c17b303773068de14d9576ce3b2f29fca80c3f6e6b342da32ece552d7e2972a328992cd00c7e7045ff2724c2f8e305ce11ca96972a6f88a4eea4ca1d6bef2a98a8a931d54575d2befd5394537bb4c63d544c1aca775c8de7cc439b1d75ecd64265c7fb36d618f48f8a362ebea33cb20d9aa60b8d991a98050e1b21750057efc4109d769e1bd6ef913cd9bd8ce72939037a2b5b6fb787efd812e121db98a839de", 0xa8}], 0x5, &(0x7f0000004ec0)=[@rthdr={{0x78, 0x29, 0x39, {0x84, 0xc, 0x1, 0x40, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @remote, @mcast2, @dev={0xfe, 0x80, '\x00', 0x23}, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}]}}}], 0x78}}], 0x6, 0x14) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 05:22:15 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 05:22:15 executing program 4: umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:22:15 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x9}}) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r4 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000100)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r4, 0x8000000) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r4, 0x14a3, 0x863, 0x0, &(0x7f0000000400)={[0xdae87f5]}, 0x8) io_uring_enter(0xffffffffffffffff, 0x7746, 0xe448, 0x2, &(0x7f0000000440)={[0x9]}, 0x8) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1000}}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) clock_gettime(0x0, &(0x7f0000000180)) r5 = syz_io_uring_setup(0x7d39, &(0x7f0000000340)={0x0, 0xa585, 0x0, 0x0, 0x4}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_open_dev$loop(&(0x7f00000004c0), 0x0, 0x0) lseek(r6, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r5, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) syz_io_uring_setup(0x57f2, &(0x7f0000000240)={0x0, 0x649b, 0x1, 0x3, 0xbe, 0x0, r7}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f00000003c0)) [ 1194.987084] FAULT_INJECTION: forcing a failure. [ 1194.987084] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.989334] CPU: 1 PID: 9305 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1194.990265] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.991407] Call Trace: [ 1194.991781] dump_stack+0x107/0x167 [ 1194.992282] should_fail.cold+0x5/0xa [ 1194.992816] ? create_object.isra.0+0x3a/0xa20 [ 1194.993443] should_failslab+0x5/0x20 [ 1194.993976] kmem_cache_alloc+0x5b/0x310 [ 1194.994550] create_object.isra.0+0x3a/0xa20 [ 1194.995166] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1194.995872] __kmalloc+0x16e/0x390 [ 1194.996360] ? lock_downgrade+0x6d0/0x6d0 [ 1194.996940] __register_sysctl_table+0x112/0x1090 [ 1194.997604] ? trace_hardirqs_on+0x5b/0x180 [ 1194.998202] ? proc_sys_evict_inode+0x180/0x180 [ 1194.998843] ? __kmalloc_track_caller+0x2c6/0x370 [ 1194.999506] ? setup_userns_sysctls+0x4d/0x180 [ 1195.000140] ? memcpy+0x39/0x60 [ 1195.000606] setup_userns_sysctls+0xc2/0x180 [ 1195.001219] create_user_ns+0x691/0xab0 [ 1195.001779] copy_creds+0x409/0x580 [ 1195.002291] copy_process+0xfdc/0x7800 [ 1195.002847] ? __lockdep_reset_lock+0x180/0x180 [ 1195.003488] ? mark_lock+0xf5/0x2df0 [ 1195.004018] ? lock_acquire+0x197/0x470 [ 1195.004563] ? find_held_lock+0x2c/0x110 [ 1195.005147] ? __cleanup_sighand+0xb0/0xb0 [ 1195.005746] ? _copy_from_user+0xfb/0x1b0 [ 1195.006340] kernel_clone+0xe7/0x980 [ 1195.006862] ? __lockdep_reset_lock+0x180/0x180 [ 1195.007505] ? create_io_thread+0xf0/0xf0 [ 1195.008094] ? ksys_write+0x21a/0x260 [ 1195.008626] ? lock_downgrade+0x6d0/0x6d0 [ 1195.009207] __do_sys_clone3+0x1e5/0x320 [ 1195.009773] ? __do_sys_clone+0x110/0x110 [ 1195.010368] ? rcu_read_lock_any_held+0x75/0xa0 [ 1195.011015] ? vfs_write+0x354/0xa70 [ 1195.011533] ? fput_many+0x2f/0x1a0 [ 1195.012042] ? ksys_write+0x1a9/0x260 [ 1195.012574] ? __ia32_sys_read+0xb0/0xb0 [ 1195.013134] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1195.013852] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1195.014556] ? trace_hardirqs_on+0x5b/0x180 [ 1195.015171] do_syscall_64+0x33/0x40 [ 1195.015678] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1195.016378] RIP: 0033:0x7f33add2bb19 [ 1195.016895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1195.019400] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1195.020449] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1195.021408] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1195.022370] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1195.023362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1195.024336] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:22:15 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:22:31 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) 05:22:31 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:22:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:22:31 executing program 7: shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r0 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmctl$IPC_RMID(r0, 0x0) fork() 05:22:31 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x35, 0x0, 0x1, 0x6}, {}, {0x6}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/57, 0x39}, {&(0x7f0000000100)=""/27, 0x1b}], 0x2) readahead(r0, 0x7d7a, 0xc50) 05:22:31 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:22:31 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:22:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1210.953042] audit: type=1326 audit(1707888151.448:152): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9328 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f0e28ca6b19 code=0x0 [ 1210.962496] FAULT_INJECTION: forcing a failure. [ 1210.962496] name failslab, interval 1, probability 0, space 0, times 0 [ 1210.964529] CPU: 1 PID: 9333 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1210.965573] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1210.966850] Call Trace: [ 1210.967276] dump_stack+0x107/0x167 [ 1210.967846] should_fail.cold+0x5/0xa [ 1210.968451] ? __register_sysctl_table+0x9ef/0x1090 [ 1210.969222] should_failslab+0x5/0x20 [ 1210.969823] __kmalloc+0x72/0x390 [ 1210.970374] __register_sysctl_table+0x9ef/0x1090 [ 1210.971151] ? proc_sys_evict_inode+0x180/0x180 [ 1210.971887] setup_userns_sysctls+0xc2/0x180 [ 1210.972586] create_user_ns+0x691/0xab0 [ 1210.973214] copy_creds+0x409/0x580 [ 1210.973792] copy_process+0xfdc/0x7800 [ 1210.974396] ? __lockdep_reset_lock+0x180/0x180 [ 1210.975131] ? mark_lock+0xf5/0x2df0 [ 1210.975717] ? lock_acquire+0x197/0x470 [ 1210.976344] ? find_held_lock+0x2c/0x110 [ 1210.976989] ? __cleanup_sighand+0xb0/0xb0 [ 1210.977669] ? _copy_from_user+0xfb/0x1b0 [ 1210.978317] kernel_clone+0xe7/0x980 [ 1210.978910] ? __lockdep_reset_lock+0x180/0x180 [ 1210.979625] ? create_io_thread+0xf0/0xf0 [ 1210.980269] ? ksys_write+0x21a/0x260 [ 1210.980845] ? lock_downgrade+0x6d0/0x6d0 [ 1210.981499] __do_sys_clone3+0x1e5/0x320 [ 1210.982115] ? __do_sys_clone+0x110/0x110 [ 1210.982785] ? rcu_read_lock_any_held+0x75/0xa0 [ 1210.983514] ? vfs_write+0x354/0xa70 [ 1210.984101] ? fput_many+0x2f/0x1a0 [ 1210.984675] ? ksys_write+0x1a9/0x260 [ 1210.985258] ? __ia32_sys_read+0xb0/0xb0 [ 1210.985898] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1210.986709] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1210.987487] ? trace_hardirqs_on+0x5b/0x180 [ 1210.988164] do_syscall_64+0x33/0x40 [ 1210.988726] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1210.989519] RIP: 0033:0x7f33add2bb19 [ 1210.990080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1210.992890] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1210.994050] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1210.995155] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1210.996253] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1210.997354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1210.998472] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 [ 1211.000191] sysctl could not get directory: //user -12 [ 1211.002197] CPU: 1 PID: 9333 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1211.003462] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1211.004788] Call Trace: [ 1211.005216] dump_stack+0x107/0x167 [ 1211.005812] __register_sysctl_table+0xdf4/0x1090 [ 1211.006600] ? proc_sys_evict_inode+0x180/0x180 [ 1211.007370] setup_userns_sysctls+0xc2/0x180 [ 1211.008089] create_user_ns+0x691/0xab0 [ 1211.008743] copy_creds+0x409/0x580 [ 1211.009336] copy_process+0xfdc/0x7800 [ 1211.009967] ? __lockdep_reset_lock+0x180/0x180 [ 1211.010714] ? mark_lock+0xf5/0x2df0 [ 1211.011328] ? lock_acquire+0x197/0x470 [ 1211.011974] ? find_held_lock+0x2c/0x110 [ 1211.012635] ? __cleanup_sighand+0xb0/0xb0 [ 1211.013327] ? _copy_from_user+0xfb/0x1b0 [ 1211.014003] kernel_clone+0xe7/0x980 [ 1211.014606] ? __lockdep_reset_lock+0x180/0x180 [ 1211.015360] ? create_io_thread+0xf0/0xf0 [ 1211.016041] ? ksys_write+0x21a/0x260 [ 1211.016646] ? lock_downgrade+0x6d0/0x6d0 [ 1211.017292] __do_sys_clone3+0x1e5/0x320 [ 1211.017943] ? __do_sys_clone+0x110/0x110 [ 1211.018608] ? rcu_read_lock_any_held+0x75/0xa0 [ 1211.019349] ? vfs_write+0x354/0xa70 [ 1211.019952] ? fput_many+0x2f/0x1a0 [ 1211.020546] ? ksys_write+0x1a9/0x260 [ 1211.021150] ? __ia32_sys_read+0xb0/0xb0 [ 1211.021814] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1211.022619] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1211.023453] ? trace_hardirqs_on+0x5b/0x180 [ 1211.024131] do_syscall_64+0x33/0x40 [ 1211.024734] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1211.025518] RIP: 0033:0x7f33add2bb19 [ 1211.026116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1211.028937] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1211.030149] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1211.031263] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1211.032398] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1211.033530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1211.034657] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:22:31 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) 05:22:31 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pidfd_open(0x0, 0x0) r1 = signalfd(r0, &(0x7f0000000040)={[0x2]}, 0x8) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000100)=0x20) [ 1211.221090] FAULT_INJECTION: forcing a failure. [ 1211.221090] name failslab, interval 1, probability 0, space 0, times 0 [ 1211.223348] CPU: 1 PID: 9347 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1211.224332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1211.225521] Call Trace: [ 1211.225915] dump_stack+0x107/0x167 [ 1211.226455] should_fail.cold+0x5/0xa [ 1211.227020] ? create_object.isra.0+0x3a/0xa20 [ 1211.227684] should_failslab+0x5/0x20 [ 1211.228239] kmem_cache_alloc+0x5b/0x310 [ 1211.228835] create_object.isra.0+0x3a/0xa20 [ 1211.229473] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1211.230201] __kmalloc+0x16e/0x390 [ 1211.230731] __register_sysctl_table+0x9ef/0x1090 [ 1211.231451] ? proc_sys_evict_inode+0x180/0x180 [ 1211.232123] ? __kmalloc_track_caller+0x2c6/0x370 [ 1211.232811] ? setup_userns_sysctls+0x4d/0x180 [ 1211.233480] ? memcpy+0x39/0x60 [ 1211.233962] setup_userns_sysctls+0xc2/0x180 [ 1211.234609] create_user_ns+0x691/0xab0 [ 1211.235203] copy_creds+0x409/0x580 [ 1211.235738] copy_process+0xfdc/0x7800 [ 1211.236304] ? __lockdep_reset_lock+0x180/0x180 [ 1211.236981] ? mark_lock+0xf5/0x2df0 [ 1211.237530] ? lock_acquire+0x197/0x470 [ 1211.238104] ? find_held_lock+0x2c/0x110 [ 1211.238700] ? __cleanup_sighand+0xb0/0xb0 [ 1211.239346] ? _copy_from_user+0xfb/0x1b0 [ 1211.239939] kernel_clone+0xe7/0x980 [ 1211.240472] ? __lockdep_reset_lock+0x180/0x180 [ 1211.241130] ? create_io_thread+0xf0/0xf0 [ 1211.241734] ? ksys_write+0x21a/0x260 [ 1211.242279] ? lock_downgrade+0x6d0/0x6d0 [ 1211.242863] __do_sys_clone3+0x1e5/0x320 [ 1211.243451] ? __do_sys_clone+0x110/0x110 [ 1211.244045] ? rcu_read_lock_any_held+0x75/0xa0 [ 1211.244703] ? vfs_write+0x354/0xa70 [ 1211.245228] ? fput_many+0x2f/0x1a0 [ 1211.245744] ? ksys_write+0x1a9/0x260 [ 1211.246273] ? __ia32_sys_read+0xb0/0xb0 [ 1211.246854] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1211.247596] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1211.248317] ? trace_hardirqs_on+0x5b/0x180 [ 1211.248914] do_syscall_64+0x33/0x40 [ 1211.249443] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1211.250149] RIP: 0033:0x7f33add2bb19 [ 1211.250678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1211.253195] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1211.254283] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1211.255285] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1211.256278] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1211.257261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1211.258253] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:22:32 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:22:32 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) 05:22:32 executing program 7: r0 = syz_io_uring_setup(0x4007f02, &(0x7f0000000240)={0x0, 0xfffffffe, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000000c0)=0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000180)=@sco={0x1f, @none}}, 0x0) r4 = syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0xa939, 0x0, 0x3, 0xfffffffe}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000300), 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x3, 0x0, 0x401, 0x1, &(0x7f0000000100)="bd469da34ea05fe6dc95735c18514b5977d18ed921069a9998c2203614311eb7bc0b5ea9ab919b409b6b9cd64fd16a43e24d7a2854dec86aef176cc041472d95de059ea73c14b058cb8531e99892cae3ca338071a414afac8eaf", 0x2, 0x0, 0x1, {0x3}}, 0x101) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000002, 0x10, r4, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x7e66, 0x0, 0x3, 0x0, 0x0) 05:22:32 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1211.649760] FAULT_INJECTION: forcing a failure. [ 1211.649760] name failslab, interval 1, probability 0, space 0, times 0 [ 1211.651965] CPU: 0 PID: 9355 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1211.653112] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1211.654505] Call Trace: [ 1211.654961] dump_stack+0x107/0x167 [ 1211.655574] should_fail.cold+0x5/0xa [ 1211.656211] ? __delayacct_tsk_init+0x1b/0x80 [ 1211.656963] should_failslab+0x5/0x20 [ 1211.657606] kmem_cache_alloc+0x5b/0x310 [ 1211.658292] __delayacct_tsk_init+0x1b/0x80 [ 1211.659020] copy_process+0x3319/0x7800 [ 1211.659684] ? __lockdep_reset_lock+0x180/0x180 [ 1211.660462] ? mark_lock+0xf5/0x2df0 [ 1211.661090] ? lock_acquire+0x197/0x470 [ 1211.661757] ? find_held_lock+0x2c/0x110 [ 1211.662455] ? __cleanup_sighand+0xb0/0xb0 [ 1211.663194] ? _copy_from_user+0xfb/0x1b0 [ 1211.663863] kernel_clone+0xe7/0x980 [ 1211.664471] ? __lockdep_reset_lock+0x180/0x180 [ 1211.665198] ? create_io_thread+0xf0/0xf0 [ 1211.665875] ? ksys_write+0x21a/0x260 [ 1211.666497] ? lock_downgrade+0x6d0/0x6d0 [ 1211.667183] __do_sys_clone3+0x1e5/0x320 [ 1211.667842] ? __do_sys_clone+0x110/0x110 [ 1211.668532] ? rcu_read_lock_any_held+0x75/0xa0 [ 1211.669265] ? vfs_write+0x354/0xa70 [ 1211.669866] ? fput_many+0x2f/0x1a0 [ 1211.670448] ? ksys_write+0x1a9/0x260 [ 1211.671099] ? __ia32_sys_read+0xb0/0xb0 [ 1211.671800] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1211.672676] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1211.673484] ? trace_hardirqs_on+0x5b/0x180 [ 1211.674169] do_syscall_64+0x33/0x40 [ 1211.674766] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1211.675597] RIP: 0033:0x7f33add2bb19 [ 1211.676194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1211.679106] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1211.680304] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1211.681417] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1211.682558] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1211.683693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1211.684816] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 [ 1211.774208] audit: type=1326 audit(1707888152.267:153): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9328 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f0e28ca6b19 code=0x0 05:22:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r3, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) splice(r0, &(0x7f0000000000)=0x100000000, r3, &(0x7f0000000080)=0x43, 0x5, 0x8) clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) [ 1213.715191] Bluetooth: hci5: command 0x0405 tx timeout 05:22:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:22:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:22:48 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000240), 0xf}, 0x49800}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) io_getevents(0x0, 0x2000000001, 0x1, &(0x7f0000000080)=[{}], 0x0) io_submit(0x0, 0x1, &(0x7f00000008c0)=[&(0x7f0000000180)={0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) eventfd(0x20) r1 = signalfd4(r0, &(0x7f0000000380)={[0x7ff]}, 0x8, 0x80000) r2 = fsopen(&(0x7f00000000c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/cpuset.cpus\x00', 0x0, 0x0) io_getevents(0x0, 0x1, 0x1, &(0x7f0000000080)=[{}], 0x0) io_getevents(0x0, 0x6, 0x3, &(0x7f00000001c0)=[{}, {}, {}], 0x0) io_submit(0x0, 0x1, &(0x7f00000008c0)=[&(0x7f0000000180)={0x0, 0x0, 0x5, 0x0, 0x0, r3, 0x0}]) r4 = fsopen(&(0x7f00000000c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) dup2(r0, r0) syslog(0x2, &(0x7f00000002c0)=""/129, 0x81) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/55, 0x37, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f0000001e00)=ANY=[@ANYBLOB="e0112dbd7000fcdbdf259f5c40ca8a993c99e4d33300221164800800910000000000000023e24c52e048911f932642fba6036fede1c7ad3cebd331", @ANYRES32=0x0, @ANYBLOB="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"], 0x11e0}, 0x1, 0x0, 0x0, 0x40041}, 0x4008000) syz_io_uring_setup(0x2662, &(0x7f0000000000)={0x0, 0x1829, 0x0, 0x3, 0x152}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 05:22:48 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0x0, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:22:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:22:48 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) 05:22:48 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:22:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r3, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) splice(r0, &(0x7f0000000000)=0x100000000, r3, &(0x7f0000000080)=0x43, 0x5, 0x8) clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) [ 1228.138496] FAULT_INJECTION: forcing a failure. [ 1228.138496] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.139934] CPU: 0 PID: 9388 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1228.140701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1228.141616] Call Trace: [ 1228.141913] dump_stack+0x107/0x167 [ 1228.142332] should_fail.cold+0x5/0xa [ 1228.142756] ? create_object.isra.0+0x3a/0xa20 [ 1228.143271] should_failslab+0x5/0x20 [ 1228.143688] kmem_cache_alloc+0x5b/0x310 [ 1228.144137] create_object.isra.0+0x3a/0xa20 [ 1228.144614] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1228.145177] kmem_cache_alloc+0x159/0x310 [ 1228.145635] __delayacct_tsk_init+0x1b/0x80 [ 1228.146106] copy_process+0x3319/0x7800 [ 1228.146550] ? __lockdep_reset_lock+0x180/0x180 [ 1228.147058] ? mark_lock+0xf5/0x2df0 [ 1228.147469] ? lock_acquire+0x197/0x470 [ 1228.147899] ? find_held_lock+0x2c/0x110 [ 1228.148350] ? __cleanup_sighand+0xb0/0xb0 [ 1228.148819] ? _copy_from_user+0xfb/0x1b0 [ 1228.149269] kernel_clone+0xe7/0x980 [ 1228.149667] ? __lockdep_reset_lock+0x180/0x180 [ 1228.150176] ? create_io_thread+0xf0/0xf0 [ 1228.150637] ? ksys_write+0x21a/0x260 [ 1228.151047] ? lock_downgrade+0x6d0/0x6d0 [ 1228.151502] __do_sys_clone3+0x1e5/0x320 [ 1228.151934] ? __do_sys_clone+0x110/0x110 [ 1228.152397] ? rcu_read_lock_any_held+0x75/0xa0 [ 1228.152894] ? vfs_write+0x354/0xa70 [ 1228.153302] ? fput_many+0x2f/0x1a0 [ 1228.153697] ? ksys_write+0x1a9/0x260 [ 1228.154110] ? __ia32_sys_read+0xb0/0xb0 [ 1228.154551] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1228.155122] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1228.155669] ? trace_hardirqs_on+0x5b/0x180 [ 1228.156137] do_syscall_64+0x33/0x40 [ 1228.156555] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1228.157115] RIP: 0033:0x7f33add2bb19 [ 1228.157533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1228.159513] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1228.160352] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1228.161142] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1228.161903] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1228.162667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1228.163448] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:22:48 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) [ 1228.459124] FAULT_INJECTION: forcing a failure. [ 1228.459124] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.462205] CPU: 1 PID: 9402 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1228.463275] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1228.464556] Call Trace: [ 1228.464975] dump_stack+0x107/0x167 [ 1228.465548] should_fail.cold+0x5/0xa [ 1228.466146] ? inherit_task_group.isra.0+0x244/0x5c0 [ 1228.466942] should_failslab+0x5/0x20 [ 1228.467543] kmem_cache_alloc_trace+0x55/0x320 [ 1228.468268] inherit_task_group.isra.0+0x244/0x5c0 [ 1228.469037] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1228.469825] ? trace_hardirqs_on+0x5b/0x180 [ 1228.470497] perf_event_init_task+0x375/0x800 [ 1228.471215] ? perf_event_attrs+0x40/0x40 [ 1228.471873] ? __hrtimer_init+0x12c/0x270 [ 1228.472531] ? memset+0x20/0x50 [ 1228.473066] copy_process+0x182e/0x7800 [ 1228.473689] ? __lockdep_reset_lock+0x180/0x180 [ 1228.474427] ? mark_lock+0xf5/0x2df0 [ 1228.475020] ? lock_acquire+0x197/0x470 [ 1228.475663] ? find_held_lock+0x2c/0x110 [ 1228.476318] ? __cleanup_sighand+0xb0/0xb0 [ 1228.477017] ? _copy_from_user+0xfb/0x1b0 [ 1228.477675] kernel_clone+0xe7/0x980 [ 1228.478277] ? __lockdep_reset_lock+0x180/0x180 [ 1228.479001] ? create_io_thread+0xf0/0xf0 [ 1228.479688] ? ksys_write+0x21a/0x260 [ 1228.480289] ? lock_downgrade+0x6d0/0x6d0 [ 1228.480956] __do_sys_clone3+0x1e5/0x320 [ 1228.481594] ? __do_sys_clone+0x110/0x110 [ 1228.482284] ? rcu_read_lock_any_held+0x75/0xa0 [ 1228.483009] ? vfs_write+0x354/0xa70 [ 1228.483620] ? fput_many+0x2f/0x1a0 [ 1228.484198] ? ksys_write+0x1a9/0x260 [ 1228.484810] ? __ia32_sys_read+0xb0/0xb0 [ 1228.485459] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1228.486295] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1228.487099] ? trace_hardirqs_on+0x5b/0x180 [ 1228.487802] do_syscall_64+0x33/0x40 [ 1228.488385] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1228.489209] RIP: 0033:0x7f33add2bb19 [ 1228.489792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1228.492932] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1228.494249] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1228.495490] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1228.496710] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1228.497832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1228.498928] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:22:49 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) 05:22:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000001700)='./file1\x00', 0x408000, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005740)=[{{&(0x7f0000000140), 0x6e, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/233, 0xe9}, {&(0x7f00000002c0)=""/169, 0xa9}, {&(0x7f0000000480)=""/253, 0xfd}], 0x3}}, {{&(0x7f0000000580)=@abs, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000600)=""/197, 0xc5}, {&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)}, {&(0x7f0000001740)=""/86, 0x56}, {&(0x7f00000017c0)=""/195, 0xc3}, {&(0x7f00000018c0)=""/235, 0xeb}], 0x7, &(0x7f0000001a40)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xa0}}, {{&(0x7f0000001b00), 0x6e, &(0x7f0000004140)=[{&(0x7f0000001b80)=""/248, 0xf8}, {&(0x7f0000001c80)=""/43, 0x2b}, {&(0x7f0000001cc0)=""/138, 0x8a}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/221, 0xdd}, {&(0x7f0000003f00)=""/87, 0x57}, {&(0x7f0000003f80)=""/174, 0xae}, {&(0x7f0000004040)=""/210, 0xd2}], 0x9, &(0x7f0000004200)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000003500000000002000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x110}}, {{0x0, 0x0, &(0x7f0000004480)=[{&(0x7f0000004340)=""/215, 0xd7}, {&(0x7f0000004440)=""/4, 0x4}], 0x2, &(0x7f00000044c0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}}, {{0x0, 0x0, &(0x7f00000055c0)=[{&(0x7f00000045c0)=""/4096, 0x1000}], 0x1, &(0x7f0000005600)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x108}}], 0x5, 0x100, &(0x7f0000005880)={0x77359400}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r3, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000058c0)) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0xf8, 0xcf, 0x3, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0xa}, 0x4001, 0xfffffffffffffffb, 0x8721, 0x5, 0x1, 0x1cc1, 0x3ff, 0x0, 0xffffffe1, 0x0, 0x10001}, 0x0, 0x7, r2, 0xa) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000005b40)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1/file0\x00'}) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r4, &(0x7f0000005c40)={&(0x7f0000005b80)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000005c00)={&(0x7f0000005bc0)={0x2c, 0x4, 0x8, 0x0, 0x0, 0x0, {0x1, 0x0, 0x5}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x5b19}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24004080}, 0x4000040) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) perf_event_open(&(0x7f0000005ac0)={0x2, 0x80, 0x2, 0x7f, 0x6, 0x20, 0x0, 0x8, 0x304a8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000005c80), 0x9}, 0x4008, 0x7, 0x7fffffff, 0x1, 0x2b9d5517, 0x8001, 0x210, 0x0, 0xfffffffa}, r1, 0xf, r5, 0x9) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x1, &(0x7f0000000380)=[{0x0}], 0x2208009, &(0x7f0000000440)) [ 1228.674775] FAULT_INJECTION: forcing a failure. [ 1228.674775] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.676050] CPU: 0 PID: 9406 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1228.676599] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1228.677276] Call Trace: [ 1228.677504] dump_stack+0x107/0x167 [ 1228.677815] should_fail.cold+0x5/0xa [ 1228.678192] ? create_object.isra.0+0x3a/0xa20 [ 1228.678583] should_failslab+0x5/0x20 [ 1228.678963] kmem_cache_alloc+0x5b/0x310 [ 1228.679322] create_object.isra.0+0x3a/0xa20 [ 1228.679753] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1228.680181] kmem_cache_alloc_trace+0x151/0x320 [ 1228.680666] inherit_task_group.isra.0+0x244/0x5c0 [ 1228.681120] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1228.681620] ? trace_hardirqs_on+0x5b/0x180 [ 1228.682044] perf_event_init_task+0x375/0x800 [ 1228.682450] ? perf_event_attrs+0x40/0x40 [ 1228.682816] ? __hrtimer_init+0x12c/0x270 [ 1228.683243] ? memset+0x20/0x50 [ 1228.683571] copy_process+0x182e/0x7800 [ 1228.683927] ? __lockdep_reset_lock+0x180/0x180 [ 1228.684379] ? mark_lock+0xf5/0x2df0 [ 1228.684747] ? lock_acquire+0x197/0x470 [ 1228.685096] ? find_held_lock+0x2c/0x110 [ 1228.685479] ? __cleanup_sighand+0xb0/0xb0 [ 1228.685856] ? _copy_from_user+0xfb/0x1b0 [ 1228.686214] kernel_clone+0xe7/0x980 [ 1228.686528] ? __lockdep_reset_lock+0x180/0x180 [ 1228.686907] ? create_io_thread+0xf0/0xf0 [ 1228.687268] ? ksys_write+0x21a/0x260 [ 1228.687643] ? lock_downgrade+0x6d0/0x6d0 [ 1228.688002] __do_sys_clone3+0x1e5/0x320 [ 1228.688402] ? __do_sys_clone+0x110/0x110 [ 1228.688779] ? rcu_read_lock_any_held+0x75/0xa0 [ 1228.689227] ? vfs_write+0x354/0xa70 [ 1228.689541] ? fput_many+0x2f/0x1a0 [ 1228.689859] ? ksys_write+0x1a9/0x260 [ 1228.690260] ? __ia32_sys_read+0xb0/0xb0 [ 1228.690639] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1228.691072] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1228.691580] ? trace_hardirqs_on+0x5b/0x180 [ 1228.692011] do_syscall_64+0x33/0x40 [ 1228.692352] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1228.692810] RIP: 0033:0x7f33add2bb19 [ 1228.693112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1228.694780] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1228.695417] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1228.695997] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1228.696589] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1228.697170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1228.697743] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:22:49 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0x0, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:22:49 executing program 4: ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f00000002c0)={{0x4, 0x200}, {0x5, 0x355e8834}, 0x3}) personality(0x400000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0xf88c0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x1, 0x0, 0x0, 'queue1\x00', 0x3}) r2 = syz_io_uring_setup(0x794d, &(0x7f0000000080)={0x0, 0x87e4, 0x3a, 0x4, 0x100161}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) r3 = fork() pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ppoll(&(0x7f0000000380)=[{r1, 0x128}, {0xffffffffffffffff, 0x2002}, {r2}, {0xffffffffffffffff, 0x6080}, {r2, 0x9200}, {r2, 0x62}, {r5, 0x10c}], 0x7, &(0x7f00000003c0), &(0x7f0000000400), 0x8) r6 = fork() ptrace$setregset(0x4205, 0x0, 0x2, &(0x7f0000000300)={&(0x7f0000000440)="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", 0x1000}) kcmp(r3, r6, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) r7 = getpgrp(0x0) kcmp(r7, r7, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fork() r8 = fork() r9 = gettid() capset(&(0x7f0000000140)={0x19980330, r9}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc6, 0x69}) kcmp(r8, r6, 0x6, r4, 0xffffffffffffffff) 05:22:49 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:22:49 executing program 7: r0 = epoll_create1(0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x90000019}) r2 = epoll_create(0x3ff) getpgrp(0x0) pidfd_open(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000200)={0x20000001}) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x1080}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={[0x401]}, 0x8) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r4 = dup2(r3, r0) r5 = openat2(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x38aa8bafa8aee241, 0x1, 0xe697ad81ff146230}, 0x18) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'caif0\x00'}) 05:23:05 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0x0, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1245.104886] FAULT_INJECTION: forcing a failure. [ 1245.104886] name failslab, interval 1, probability 0, space 0, times 0 [ 1245.107047] CPU: 0 PID: 9443 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1245.108273] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1245.109718] Call Trace: [ 1245.110198] dump_stack+0x107/0x167 [ 1245.110849] should_fail.cold+0x5/0xa [ 1245.111549] ? perf_event_alloc.part.0+0x5b/0x2b70 [ 1245.112429] should_failslab+0x5/0x20 [ 1245.113113] kmem_cache_alloc_trace+0x55/0x320 [ 1245.113940] perf_event_alloc.part.0+0x5b/0x2b70 [ 1245.114793] ? lockdep_init_map_type+0x2c7/0x780 [ 1245.115872] inherit_event.constprop.0+0x168/0x8d0 [ 1245.116756] inherit_task_group.isra.0+0xb6/0x5c0 [ 1245.117628] perf_event_init_task+0x375/0x800 [ 1245.118442] ? perf_event_attrs+0x40/0x40 [ 1245.119180] ? __hrtimer_init+0x12c/0x270 [ 1245.119926] ? memset+0x20/0x50 [ 1245.120530] copy_process+0x182e/0x7800 [ 1245.121246] ? __lockdep_reset_lock+0x180/0x180 [ 1245.122067] ? mark_lock+0xf5/0x2df0 [ 1245.122740] ? lock_acquire+0x197/0x470 [ 1245.123455] ? find_held_lock+0x2c/0x110 [ 1245.124202] ? __cleanup_sighand+0xb0/0xb0 [ 1245.124973] ? _copy_from_user+0xfb/0x1b0 [ 1245.125725] kernel_clone+0xe7/0x980 [ 1245.126388] ? __lockdep_reset_lock+0x180/0x180 [ 1245.127213] ? create_io_thread+0xf0/0xf0 [ 1245.127988] ? ksys_write+0x21a/0x260 [ 1245.128668] ? lock_downgrade+0x6d0/0x6d0 [ 1245.129413] __do_sys_clone3+0x1e5/0x320 [ 1245.130137] ? __do_sys_clone+0x110/0x110 [ 1245.130905] ? rcu_read_lock_any_held+0x75/0xa0 [ 1245.131742] ? vfs_write+0x354/0xa70 [ 1245.132411] ? fput_many+0x2f/0x1a0 [ 1245.133062] ? ksys_write+0x1a9/0x260 [ 1245.133743] ? __ia32_sys_read+0xb0/0xb0 [ 1245.134465] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1245.135404] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1245.136302] ? trace_hardirqs_on+0x5b/0x180 [ 1245.137082] do_syscall_64+0x33/0x40 [ 1245.137735] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1245.138804] RIP: 0033:0x7f33add2bb19 [ 1245.139511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1245.142773] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1245.144124] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1245.145381] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1245.146650] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1245.147905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1245.149125] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:23:05 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:23:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:23:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:05 executing program 7: accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000040)=0x1c) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=@polexpire={0xcc, 0x1b, 0x51665cf0772cf6eb, 0x0, 0x0, {{{@in=@multicast2, @in6=@ipv4={'\x00', '\xff\xff', @local}}}}, [@policy_type={0xa, 0x10, {0x1}}]}, 0xcc}}, 0x0) 05:23:05 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) 05:23:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:05 executing program 4: syz_open_dev$mouse(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) 05:23:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x247e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(r3, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000140)='system_u:object_r:devtty_t:s0\x00', 0x1e, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$packet_int(r3, 0x107, 0xc, &(0x7f0000000080), 0x4) syz_io_uring_complete(r1) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x4, r6, 0x1, 0x0, 0x6, @local}, 0x14) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:unconfined_execmem_exec_t:s0\x00', 0x2f, 0x2) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000280)={'team0\x00'}) [ 1245.168754] audit: type=1400 audit(1707888185.664:154): avc: denied { relabelto } for pid=9449 comm="syz-executor.4" name="PACKET" dev="sockfs" ino=35014 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unconfined_execmem_exec_t:s0 tclass=packet_socket permissive=1 05:23:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1403, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x40, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000000)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:23:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) recvmmsg(0xffffffffffffffff, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r3, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x202, 0x0) 05:23:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x8, 0x0, 0x0, 0x151, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = dup2(r2, r2) io_uring_setup(0x23, &(0x7f00000008c0)={0x0, 0x0, 0x20, 0x7, 0xad, 0x0, r1}) r4 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r4, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r5 = fsmount(r3, 0x0, 0x8) execveat(r5, &(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000700)='\x00', &(0x7f0000000740)='\x00', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000280)=0x2b8) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r6, 0x0) 05:23:05 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) 05:23:06 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1245.465692] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1245.586480] FAULT_INJECTION: forcing a failure. [ 1245.586480] name failslab, interval 1, probability 0, space 0, times 0 05:23:06 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1245.586521] CPU: 1 PID: 9481 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1245.586527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1245.586531] Call Trace: [ 1245.586547] dump_stack+0x107/0x167 [ 1245.586562] should_fail.cold+0x5/0xa [ 1245.586576] ? create_object.isra.0+0x3a/0xa20 [ 1245.586589] should_failslab+0x5/0x20 05:23:06 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, 0x0, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0xe}}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4568}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xc9aa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x440c1) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(r1, 0x4, 0xc00) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000080), 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r1) [ 1245.586600] kmem_cache_alloc+0x5b/0x310 [ 1245.586609] ? create_object.isra.0+0x3ad/0xa20 [ 1245.586623] create_object.isra.0+0x3a/0xa20 [ 1245.586634] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1245.586649] kmem_cache_alloc_trace+0x151/0x320 [ 1245.586665] perf_event_alloc.part.0+0x5b/0x2b70 [ 1245.586679] ? lockdep_init_map_type+0x2c7/0x780 [ 1245.586695] inherit_event.constprop.0+0x168/0x8d0 [ 1245.586711] inherit_task_group.isra.0+0xb6/0x5c0 [ 1245.586728] perf_event_init_task+0x375/0x800 [ 1245.586745] ? perf_event_attrs+0x40/0x40 [ 1245.586755] ? __hrtimer_init+0x12c/0x270 [ 1245.586770] ? memset+0x20/0x50 [ 1245.586786] copy_process+0x182e/0x7800 [ 1245.586801] ? __lockdep_reset_lock+0x180/0x180 [ 1245.586810] ? mark_lock+0xf5/0x2df0 [ 1245.586826] ? lock_acquire+0x197/0x470 [ 1245.586835] ? find_held_lock+0x2c/0x110 [ 1245.586857] ? __cleanup_sighand+0xb0/0xb0 [ 1245.586879] ? _copy_from_user+0xfb/0x1b0 [ 1245.586896] kernel_clone+0xe7/0x980 [ 1245.586906] ? __lockdep_reset_lock+0x180/0x180 [ 1245.586918] ? create_io_thread+0xf0/0xf0 [ 1245.586939] ? ksys_write+0x21a/0x260 [ 1245.586950] ? lock_downgrade+0x6d0/0x6d0 [ 1245.586964] __do_sys_clone3+0x1e5/0x320 [ 1245.586974] ? __do_sys_clone+0x110/0x110 [ 1245.586999] ? rcu_read_lock_any_held+0x75/0xa0 [ 1245.587008] ? vfs_write+0x354/0xa70 [ 1245.587022] ? fput_many+0x2f/0x1a0 [ 1245.587033] ? ksys_write+0x1a9/0x260 [ 1245.587044] ? __ia32_sys_read+0xb0/0xb0 [ 1245.587058] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1245.587070] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1245.587079] ? trace_hardirqs_on+0x5b/0x180 [ 1245.587093] do_syscall_64+0x33/0x40 [ 1245.587103] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1245.587111] RIP: 0033:0x7f33add2bb19 [ 1245.587121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1245.587127] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1245.587140] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1245.587146] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1245.587152] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1245.587158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1245.587164] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:23:06 executing program 7: syz_open_dev$mouse(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') 05:23:06 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) [ 1245.915336] FAULT_INJECTION: forcing a failure. [ 1245.915336] name failslab, interval 1, probability 0, space 0, times 0 [ 1245.916330] CPU: 1 PID: 9496 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1245.916867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1245.917531] Call Trace: [ 1245.917751] dump_stack+0x107/0x167 [ 1245.918053] should_fail.cold+0x5/0xa [ 1245.918365] ? selinux_perf_event_alloc+0x43/0x190 [ 1245.918764] should_failslab+0x5/0x20 [ 1245.919068] kmem_cache_alloc_trace+0x55/0x320 [ 1245.919457] selinux_perf_event_alloc+0x43/0x190 [ 1245.919838] security_perf_event_alloc+0x46/0xa0 [ 1245.920226] perf_event_alloc.part.0+0x18b3/0x2b70 [ 1245.920626] inherit_event.constprop.0+0x168/0x8d0 [ 1245.921030] inherit_task_group.isra.0+0xb6/0x5c0 [ 1245.921435] perf_event_init_task+0x375/0x800 [ 1245.921803] ? perf_event_attrs+0x40/0x40 [ 1245.922128] ? __hrtimer_init+0x12c/0x270 [ 1245.922476] ? memset+0x20/0x50 [ 1245.922745] copy_process+0x182e/0x7800 [ 1245.923071] ? __lockdep_reset_lock+0x180/0x180 [ 1245.923455] ? mark_lock+0xf5/0x2df0 [ 1245.923765] ? lock_acquire+0x197/0x470 [ 1245.924073] ? find_held_lock+0x2c/0x110 [ 1245.924420] ? __cleanup_sighand+0xb0/0xb0 [ 1245.924770] ? _copy_from_user+0xfb/0x1b0 [ 1245.925110] kernel_clone+0xe7/0x980 [ 1245.925405] ? __lockdep_reset_lock+0x180/0x180 [ 1245.925784] ? create_io_thread+0xf0/0xf0 [ 1245.926117] ? ksys_write+0x21a/0x260 [ 1245.926427] ? lock_downgrade+0x6d0/0x6d0 [ 1245.926751] __do_sys_clone3+0x1e5/0x320 [ 1245.927083] ? __do_sys_clone+0x110/0x110 [ 1245.927427] ? rcu_read_lock_any_held+0x75/0xa0 [ 1245.927801] ? vfs_write+0x354/0xa70 [ 1245.928092] ? fput_many+0x2f/0x1a0 [ 1245.928393] ? ksys_write+0x1a9/0x260 [ 1245.928686] ? __ia32_sys_read+0xb0/0xb0 [ 1245.929015] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1245.929436] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1245.929852] ? trace_hardirqs_on+0x5b/0x180 [ 1245.930192] do_syscall_64+0x33/0x40 [ 1245.930503] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1245.930917] RIP: 0033:0x7f33add2bb19 [ 1245.931225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1245.932662] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1245.933283] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1245.933861] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1245.934442] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1245.934987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1245.935573] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:23:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) recvmmsg(0xffffffffffffffff, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r3, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x202, 0x0) 05:23:23 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:23:23 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:23:23 executing program 7: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x38) statx(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x402}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x3000000}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r4 = accept4(r0, &(0x7f00000003c0)=@rc, &(0x7f0000000440)=0x80, 0x80000) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r5, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x13c, 0x29, 0x20, 0x70bd2a, 0x25dfdbfc, {0x17}, [@nested={0x128, 0x71, 0x0, 0x1, [@typed={0x14, 0x5e, 0x0, 0x0, @ipv6=@private1}, @typed={0x4, 0x49}, @generic="a0b7f0efea352566098345283c07d10145000131286b3798714008e0fff2bd9f254f76d2ac443fa074943a11500126f679b4afb2d602e503879366e2593b74f349b417452aaff0462d5dca98aeff50e6109c70f6a868ba83", @typed={0x8, 0x2, 0x0, 0x0, @fd=r5}, @generic="f62bbf5444154fad04e49307b5bf36a54372e4e5e74823fe6a444ede4dd4e7dbb5835f9c30b8aee326f61e1e9076df94bc5b876a3f75b19e5b3334f3dc20c6d28e53647e86307aa911b8f1f7c5fcff04e5f2ff6ad8c8c71a58172f21669aec2c01db4a4814e081a06dd7b43948b64efd2243fd5ebeb7476c88519b21785600b5da72fe8117e5539ff2f33452886c8bade8e4046746756f2c0a65e89da2219c30fbe1a80a8ff6cc2949f59eba"]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x80}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff1000/0xe000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000fef000/0x9000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff1000/0x2000)=nil, &(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000080)="1876fd1c44dd448a90194f4e131f8f7e7768004787dd6f2acfc1e123", 0x1c, r1}, 0x68) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x2f, 0x2, 0x6a, 0x101, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x20, 0x0, 0x61, 0x6}}) r6 = syz_open_dev$vcsn(&(0x7f0000000200), 0x80000000, 0x501400) faccessat(r6, &(0x7f00000002c0)='./file1\x00', 0x180) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d00210c000000001600000000020008000c00000000005592dcd68375ec5c6fbd8bf2dbcbe4"], 0x1c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) 05:23:23 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) 05:23:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1262.743948] FAULT_INJECTION: forcing a failure. [ 1262.743948] name failslab, interval 1, probability 0, space 0, times 0 [ 1262.746196] CPU: 0 PID: 9517 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1262.747575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1262.749038] Call Trace: [ 1262.749501] dump_stack+0x107/0x167 [ 1262.750116] should_fail.cold+0x5/0xa [ 1262.750767] ? create_object.isra.0+0x3a/0xa20 [ 1262.751543] should_failslab+0x5/0x20 [ 1262.752189] kmem_cache_alloc+0x5b/0x310 [ 1262.752888] create_object.isra.0+0x3a/0xa20 [ 1262.753641] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1262.754508] kmem_cache_alloc_trace+0x151/0x320 [ 1262.755323] selinux_perf_event_alloc+0x43/0x190 [ 1262.756139] security_perf_event_alloc+0x46/0xa0 [ 1262.756950] perf_event_alloc.part.0+0x18b3/0x2b70 [ 1262.758258] inherit_event.constprop.0+0x168/0x8d0 [ 1262.758291] inherit_task_group.isra.0+0xb6/0x5c0 [ 1262.758323] perf_event_init_task+0x375/0x800 [ 1262.758355] ? perf_event_attrs+0x40/0x40 [ 1262.758375] ? __hrtimer_init+0x12c/0x270 [ 1262.758404] ? memset+0x20/0x50 [ 1262.758433] copy_process+0x182e/0x7800 [ 1262.758456] ? __lockdep_reset_lock+0x180/0x180 [ 1262.758473] ? mark_lock+0xf5/0x2df0 [ 1262.758503] ? lock_acquire+0x197/0x470 [ 1262.758522] ? find_held_lock+0x2c/0x110 [ 1262.758563] ? __cleanup_sighand+0xb0/0xb0 [ 1262.758604] ? _copy_from_user+0xfb/0x1b0 [ 1262.758635] kernel_clone+0xe7/0x980 [ 1262.758655] ? __lockdep_reset_lock+0x180/0x180 [ 1262.758677] ? create_io_thread+0xf0/0xf0 [ 1262.758717] ? ksys_write+0x21a/0x260 [ 1262.758737] ? lock_downgrade+0x6d0/0x6d0 [ 1262.758764] __do_sys_clone3+0x1e5/0x320 [ 1262.758784] ? __do_sys_clone+0x110/0x110 [ 1262.758830] ? rcu_read_lock_any_held+0x75/0xa0 [ 1262.758848] ? vfs_write+0x354/0xa70 [ 1262.758873] ? fput_many+0x2f/0x1a0 [ 1262.758895] ? ksys_write+0x1a9/0x260 [ 1262.758916] ? __ia32_sys_read+0xb0/0xb0 [ 1262.758942] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1262.758963] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1262.758979] ? trace_hardirqs_on+0x5b/0x180 [ 1262.759006] do_syscall_64+0x33/0x40 [ 1262.759025] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1262.759039] RIP: 0033:0x7f33add2bb19 [ 1262.759058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1262.759069] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1262.759091] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1262.759102] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1262.759114] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 05:23:23 executing program 7: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x38) statx(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x402}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x3000000}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r4 = accept4(r0, &(0x7f00000003c0)=@rc, &(0x7f0000000440)=0x80, 0x80000) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r5, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x13c, 0x29, 0x20, 0x70bd2a, 0x25dfdbfc, {0x17}, [@nested={0x128, 0x71, 0x0, 0x1, [@typed={0x14, 0x5e, 0x0, 0x0, @ipv6=@private1}, @typed={0x4, 0x49}, @generic="a0b7f0efea352566098345283c07d10145000131286b3798714008e0fff2bd9f254f76d2ac443fa074943a11500126f679b4afb2d602e503879366e2593b74f349b417452aaff0462d5dca98aeff50e6109c70f6a868ba83", @typed={0x8, 0x2, 0x0, 0x0, @fd=r5}, @generic="f62bbf5444154fad04e49307b5bf36a54372e4e5e74823fe6a444ede4dd4e7dbb5835f9c30b8aee326f61e1e9076df94bc5b876a3f75b19e5b3334f3dc20c6d28e53647e86307aa911b8f1f7c5fcff04e5f2ff6ad8c8c71a58172f21669aec2c01db4a4814e081a06dd7b43948b64efd2243fd5ebeb7476c88519b21785600b5da72fe8117e5539ff2f33452886c8bade8e4046746756f2c0a65e89da2219c30fbe1a80a8ff6cc2949f59eba"]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x80}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff1000/0xe000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000fef000/0x9000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff1000/0x2000)=nil, &(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000080)="1876fd1c44dd448a90194f4e131f8f7e7768004787dd6f2acfc1e123", 0x1c, r1}, 0x68) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x2f, 0x2, 0x6a, 0x101, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x20, 0x0, 0x61, 0x6}}) r6 = syz_open_dev$vcsn(&(0x7f0000000200), 0x80000000, 0x501400) faccessat(r6, &(0x7f00000002c0)='./file1\x00', 0x180) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d00210c000000001600000000020008000c00000000005592dcd68375ec5c6fbd8bf2dbcbe4"], 0x1c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) [ 1262.759125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1262.759137] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 [ 1262.782634] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 1262.782687] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 1262.782776] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 1262.782825] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 1262.782849] print_req_error: 8 callbacks suppressed [ 1262.782869] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 1262.784549] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.784615] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1262.784628] Buffer I/O error on dev sr0, logical block 0, async page read [ 1262.784908] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.784934] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1262.784944] Buffer I/O error on dev sr0, logical block 1, async page read [ 1262.785241] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.785268] blk_update_request: I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1262.785277] Buffer I/O error on dev sr0, logical block 2, async page read [ 1262.785485] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.785510] blk_update_request: I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1262.785519] Buffer I/O error on dev sr0, logical block 3, async page read [ 1262.785737] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.785762] blk_update_request: I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1262.785772] Buffer I/O error on dev sr0, logical block 4, async page read [ 1262.785921] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.785946] blk_update_request: I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1262.785955] Buffer I/O error on dev sr0, logical block 5, async page read [ 1262.786466] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.786492] blk_update_request: I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1262.786502] Buffer I/O error on dev sr0, logical block 6, async page read [ 1262.786665] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.786690] blk_update_request: I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1262.786699] Buffer I/O error on dev sr0, logical block 7, async page read [ 1262.964768] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.964817] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1262.964828] Buffer I/O error on dev sr0, logical block 0, async page read [ 1262.965038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.965058] Buffer I/O error on dev sr0, logical block 1, async page read [ 1262.965342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.965525] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.965723] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.965897] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.966151] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1262.966343] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 05:23:23 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x7ffffffff000, 0xf0ff1f00000000) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x41) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000000c0)=0x1000, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000100001000000000000000000000000000500000024386a562b500000000c00008008000d00ac141400"], 0x28}}, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r2 = syz_open_dev$mouse(&(0x7f0000000400), 0x7fffffff, 0x2d0401) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000030}, 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14a6de337200", @ANYRES16=0x0, @ANYBLOB="000127bd7000fddbdf2575000000"], 0x14}, 0x1, 0x0, 0x0, 0x95}, 0x40000) ioctl$FICLONE(r2, 0x40049409, r0) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYRES32, @ANYBLOB="2e9d0000e5bf9f00"]) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) pread64(r3, &(0x7f00000020c0)=""/4088, 0xff8, 0x0) [ 1263.174502] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:23:23 executing program 7: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5c}, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x1e9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000011c0)={0x53, 0xfffffffffffffffc, 0x0, 0x0, @buffer={0x0, 0x1000, &(0x7f0000001e00)=""/4096}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x10040, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r3, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, {r1}}, './file1\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16, @ANYBLOB="01000000000000041e004ef6fc4d9caeede931a94649d32f7917fed090baf08793403928482a31e7ec11c5c34413be509f1abd6aed5864e90568242561cbbd21d440c22d8a552cc94c338940beb259686a6092ee299630a84610515d8454930b80fd8401be34b6da4a", @ANYRES32=r5, @ANYBLOB="04001d"], 0x20}}, 0x0) 05:23:23 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:23:23 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1263.296748] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:23:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300b4e2, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x5, @private2, 0xfffffc01}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x560, 0x2000000000004}, 0x0, 0x0, 0x1004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x0, 0x34, 0x1000, 0x1f}, 0x14) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = syz_io_uring_complete(0x0) sendfile(r5, r0, 0x0, 0x101) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'veth1_to_bridge\x00'}) 05:23:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) openat(r1, &(0x7f00000000c0)='./file1\x00', 0x4240, 0x90) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 05:23:23 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) [ 1263.534804] FAULT_INJECTION: forcing a failure. [ 1263.534804] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.536876] CPU: 0 PID: 9551 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1263.537896] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1263.539099] Call Trace: [ 1263.539514] dump_stack+0x107/0x167 [ 1263.540060] should_fail.cold+0x5/0xa [ 1263.540629] ? copy_fs_struct+0x45/0x340 [ 1263.541228] should_failslab+0x5/0x20 [ 1263.541786] kmem_cache_alloc+0x5b/0x310 [ 1263.542380] ? audit_filter_inodes+0x40/0x40 [ 1263.543029] copy_fs_struct+0x45/0x340 [ 1263.543617] copy_process+0x3435/0x7800 [ 1263.544204] ? __lockdep_reset_lock+0x180/0x180 [ 1263.544899] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1263.545684] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1263.546502] ? lock_acquire+0x197/0x470 [ 1263.547083] ? find_held_lock+0x2c/0x110 [ 1263.547706] ? __cleanup_sighand+0xb0/0xb0 [ 1263.548346] ? _copy_from_user+0xfb/0x1b0 [ 1263.548979] kernel_clone+0xe7/0x980 [ 1263.549543] ? __lockdep_reset_lock+0x180/0x180 [ 1263.550240] ? create_io_thread+0xf0/0xf0 [ 1263.550874] ? ksys_write+0x21a/0x260 [ 1263.551440] ? lock_downgrade+0x6d0/0x6d0 [ 1263.552053] __do_sys_clone3+0x1e5/0x320 [ 1263.552666] ? __do_sys_clone+0x110/0x110 [ 1263.553304] ? rcu_read_lock_any_held+0x75/0xa0 [ 1263.553985] ? vfs_write+0x354/0xa70 [ 1263.554538] ? fput_many+0x2f/0x1a0 [ 1263.555077] ? ksys_write+0x1a9/0x260 [ 1263.555644] ? __ia32_sys_read+0xb0/0xb0 [ 1263.556246] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1263.557014] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1263.557764] ? trace_hardirqs_on+0x5b/0x180 [ 1263.558404] do_syscall_64+0x33/0x40 [ 1263.558951] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1263.559703] RIP: 0033:0x7f33add2bb19 [ 1263.560248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1263.562886] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1263.564001] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1263.565035] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1263.566064] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1263.567099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1263.568140] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:23:24 executing program 7: prctl$PR_SET_THP_DISABLE(0x29, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) io_submit(0x0, 0x1, &(0x7f0000000680)=[0x0]) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='#,*@!%$\x00') ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000380)={0x0, 0x800, 0x4, 0xffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) ftruncate(r0, 0x1) 05:23:24 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3f, 0x1, 0x40, 0xa0, 0x0, 0x5, 0x22430, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x100, 0x8000, 0xcdb, 0x4, 0x6, 0x7, 0x6, 0x0, 0x9, 0x0, 0xe8c}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$CDROM_DISC_STATUS(r0, 0x5327) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)=ANY=[]) 05:23:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x7, 0x4, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x20000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000640), &(0x7f0000000680)=0x4) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x80047210, &(0x7f0000000000)) unshare(0x48020200) 05:23:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:24 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8bae"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:23:24 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) [ 1263.910993] FAULT_INJECTION: forcing a failure. [ 1263.910993] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.913077] CPU: 0 PID: 9573 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1263.914101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1263.915335] Call Trace: [ 1263.915748] dump_stack+0x107/0x167 [ 1263.916326] should_fail.cold+0x5/0xa [ 1263.916912] ? selinux_perf_event_alloc+0x43/0x190 [ 1263.917655] should_failslab+0x5/0x20 [ 1263.918233] kmem_cache_alloc_trace+0x55/0x320 [ 1263.918931] selinux_perf_event_alloc+0x43/0x190 [ 1263.919652] security_perf_event_alloc+0x46/0xa0 [ 1263.920368] perf_event_alloc.part.0+0x18b3/0x2b70 [ 1263.921123] inherit_event.constprop.0+0x168/0x8d0 [ 1263.921883] inherit_task_group.isra.0+0xb6/0x5c0 [ 1263.922617] perf_event_init_task+0x375/0x800 [ 1263.923305] ? perf_event_attrs+0x40/0x40 [ 1263.923935] ? __hrtimer_init+0x12c/0x270 [ 1263.924564] ? memset+0x20/0x50 [ 1263.925071] copy_process+0x182e/0x7800 [ 1263.925671] ? __lockdep_reset_lock+0x180/0x180 [ 1263.926366] ? mark_lock+0xf5/0x2df0 [ 1263.926937] ? lock_acquire+0x197/0x470 [ 1263.927548] ? find_held_lock+0x2c/0x110 [ 1263.928168] ? __cleanup_sighand+0xb0/0xb0 [ 1263.928802] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1263.929608] ? trace_hardirqs_on+0x5b/0x180 [ 1263.930267] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1263.931097] ? kernel_clone+0x75/0x980 [ 1263.931706] kernel_clone+0xe7/0x980 [ 1263.932268] ? __lockdep_reset_lock+0x180/0x180 [ 1263.932977] ? create_io_thread+0xf0/0xf0 [ 1263.933015] ? ksys_write+0x21a/0x260 [ 1263.933034] ? lock_downgrade+0x6d0/0x6d0 [ 1263.933058] __do_sys_clone3+0x1e5/0x320 [ 1263.933076] ? __do_sys_clone+0x110/0x110 [ 1263.933118] ? rcu_read_lock_any_held+0x75/0xa0 [ 1263.933133] ? vfs_write+0x354/0xa70 [ 1263.933156] ? fput_many+0x2f/0x1a0 [ 1263.933176] ? ksys_write+0x1a9/0x260 [ 1263.933194] ? __ia32_sys_read+0xb0/0xb0 [ 1263.933218] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1263.933235] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1263.933249] ? trace_hardirqs_on+0x5b/0x180 [ 1263.933274] do_syscall_64+0x33/0x40 [ 1263.933290] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1263.933302] RIP: 0033:0x7f33add2bb19 [ 1263.933319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1263.933329] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1263.933349] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1263.933359] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1263.933370] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1263.933380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1263.933390] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:23:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:39 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:23:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:39 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8bae"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:23:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:23:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:39 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) 05:23:39 executing program 7: mq_notify(0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = creat(0x0, 0x0) syncfs(r1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000540)={{0x1, 0x1, 0x18, r1, {0xffffffff}}, './file1\x00'}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x3}}, './file1\x00'}) r5 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000000c0)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r5, 0x0, 0x9, 0xfffffffffffffff9, 0xffffffff}) sendmsg$NL80211_CMD_LEAVE_OCB(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004880}, 0x40084) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) [ 1278.689833] FAULT_INJECTION: forcing a failure. [ 1278.689833] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.691762] CPU: 0 PID: 9588 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1278.692777] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1278.693987] Call Trace: [ 1278.694391] dump_stack+0x107/0x167 [ 1278.694954] should_fail.cold+0x5/0xa [ 1278.695530] ? copy_process+0x1add/0x7800 [ 1278.696157] should_failslab+0x5/0x20 [ 1278.696722] kmem_cache_alloc+0x5b/0x310 [ 1278.697319] ? _raw_spin_unlock+0x1a/0x30 [ 1278.697931] copy_process+0x1add/0x7800 [ 1278.698537] ? __lockdep_reset_lock+0x180/0x180 [ 1278.699218] ? mark_lock+0xf5/0x2df0 [ 1278.699776] ? lock_acquire+0x197/0x470 [ 1278.700360] ? find_held_lock+0x2c/0x110 [ 1278.700977] ? __cleanup_sighand+0xb0/0xb0 [ 1278.701624] ? _copy_from_user+0xfb/0x1b0 [ 1278.702247] kernel_clone+0xe7/0x980 [ 1278.702795] ? __lockdep_reset_lock+0x180/0x180 [ 1278.703469] ? create_io_thread+0xf0/0xf0 [ 1278.704108] ? ksys_write+0x21a/0x260 [ 1278.704677] ? lock_downgrade+0x6d0/0x6d0 [ 1278.705288] __do_sys_clone3+0x1e5/0x320 [ 1278.705886] ? __do_sys_clone+0x110/0x110 [ 1278.706521] ? rcu_read_lock_any_held+0x75/0xa0 [ 1278.707195] ? vfs_write+0x354/0xa70 [ 1278.707749] ? fput_many+0x2f/0x1a0 [ 1278.708296] ? ksys_write+0x1a9/0x260 [ 1278.708853] ? __ia32_sys_read+0xb0/0xb0 [ 1278.709452] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1278.710212] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1278.710968] ? trace_hardirqs_on+0x5b/0x180 [ 1278.711613] do_syscall_64+0x33/0x40 [ 1278.712171] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1278.712908] RIP: 0033:0x7f33add2bb19 [ 1278.713444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1278.716088] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1278.717186] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1278.718206] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1278.719228] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1278.720265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1278.721307] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:23:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:55 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 05:23:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:55 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:55 executing program 1: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, 0x0) r0 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r0) keyctl$link(0x8, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:23:55 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:55 executing program 7: ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf16, 0x0, @perf_config_ext={0x20, 0x7}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080017000000000034ce68d6"], 0x1c}}, 0x40000) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x4c0a00, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='/dev/zero\x00') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:23:55 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:23:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1295.471827] FAULT_INJECTION: forcing a failure. [ 1295.471827] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.473688] CPU: 0 PID: 9625 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1295.474625] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1295.475758] Call Trace: [ 1295.476131] dump_stack+0x107/0x167 [ 1295.476640] should_fail.cold+0x5/0xa [ 1295.477174] ? create_object.isra.0+0x3a/0xa20 [ 1295.477812] should_failslab+0x5/0x20 [ 1295.478353] kmem_cache_alloc+0x5b/0x310 [ 1295.478918] create_object.isra.0+0x3a/0xa20 [ 1295.479537] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1295.480247] kmem_cache_alloc+0x159/0x310 [ 1295.480836] ? _raw_spin_unlock+0x1a/0x30 [ 1295.481432] copy_process+0x1add/0x7800 [ 1295.481988] ? __lockdep_reset_lock+0x180/0x180 [ 1295.482648] ? mark_lock+0xf5/0x2df0 [ 1295.483191] ? lock_acquire+0x197/0x470 [ 1295.483764] ? find_held_lock+0x2c/0x110 [ 1295.484339] ? __cleanup_sighand+0xb0/0xb0 [ 1295.484936] ? _copy_from_user+0xfb/0x1b0 [ 1295.485523] kernel_clone+0xe7/0x980 [ 1295.486048] ? __lockdep_reset_lock+0x180/0x180 [ 1295.486696] ? create_io_thread+0xf0/0xf0 [ 1295.487281] ? ksys_write+0x21a/0x260 [ 1295.487804] ? lock_downgrade+0x6d0/0x6d0 [ 1295.488393] __do_sys_clone3+0x1e5/0x320 [ 1295.488950] ? __do_sys_clone+0x110/0x110 [ 1295.489547] ? rcu_read_lock_any_held+0x75/0xa0 [ 1295.490203] ? vfs_write+0x354/0xa70 [ 1295.490732] ? fput_many+0x2f/0x1a0 [ 1295.491251] ? ksys_write+0x1a9/0x260 [ 1295.491785] ? __ia32_sys_read+0xb0/0xb0 [ 1295.492379] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1295.493103] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1295.493824] ? trace_hardirqs_on+0x5b/0x180 [ 1295.494430] do_syscall_64+0x33/0x40 [ 1295.494938] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1295.495663] RIP: 0033:0x7f33add2bb19 [ 1295.496196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1295.498747] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1295.499785] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1295.500778] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1295.501756] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1295.502713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1295.503700] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:23:56 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:23:56 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:23:56 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:23:56 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:23:56 executing program 4: keyctl$chown(0x4, 0x0, 0xee01, 0xee00) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r0 = add_key$fscrypt_provisioning(&(0x7f0000000380), &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000480)={0x3, 0x0, @auto=[0x2e, 0x3d, 0x3e, 0x3b, 0x40, 0x34, 0x38, 0x3f, 0x13]}, 0x11, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) request_key(&(0x7f00000004c0)='ceph\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000680)='wchan\x00', r1) keyctl$get_security(0x11, 0x0, &(0x7f00000007c0)=""/226, 0xe2) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2800, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000040)=""/242, 0xf2}], 0x1, 0x0, 0x0) request_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', 0x0) keyctl$describe(0x6, r0, &(0x7f0000000580)=""/199, 0xc7) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:23:56 executing program 1: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, 0x0) r0 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r0) keyctl$link(0x8, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:23:56 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) [ 1295.984969] FAULT_INJECTION: forcing a failure. [ 1295.984969] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.986346] CPU: 0 PID: 9650 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1295.987002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1295.987804] Call Trace: [ 1295.988079] dump_stack+0x107/0x167 [ 1295.988451] should_fail.cold+0x5/0xa [ 1295.988839] ? create_object.isra.0+0x3a/0xa20 [ 1295.989295] should_failslab+0x5/0x20 [ 1295.989682] kmem_cache_alloc+0x5b/0x310 [ 1295.990095] create_object.isra.0+0x3a/0xa20 [ 1295.990524] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1295.991034] kmem_cache_alloc+0x159/0x310 [ 1295.991447] copy_process+0x1add/0x7800 [ 1295.991846] ? __lockdep_reset_lock+0x180/0x180 [ 1295.992306] ? mark_lock+0xf5/0x2df0 [ 1295.992673] ? lock_acquire+0x197/0x470 [ 1295.993060] ? find_held_lock+0x2c/0x110 [ 1295.993477] ? __cleanup_sighand+0xb0/0xb0 [ 1295.993907] ? _copy_from_user+0xfb/0x1b0 [ 1295.994318] kernel_clone+0xe7/0x980 [ 1295.994681] ? __lockdep_reset_lock+0x180/0x180 [ 1295.995136] ? create_io_thread+0xf0/0xf0 [ 1295.995559] ? ksys_write+0x21a/0x260 [ 1295.995959] ? lock_downgrade+0x6d0/0x6d0 [ 1295.996388] __do_sys_clone3+0x1e5/0x320 [ 1295.996801] ? __do_sys_clone+0x110/0x110 [ 1295.997233] ? rcu_read_lock_any_held+0x75/0xa0 [ 1295.997694] ? vfs_write+0x354/0xa70 [ 1295.998067] ? fput_many+0x2f/0x1a0 [ 1295.998425] ? ksys_write+0x1a9/0x260 [ 1295.998800] ? __ia32_sys_read+0xb0/0xb0 [ 1295.999217] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1295.999745] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1296.000276] ? trace_hardirqs_on+0x5b/0x180 [ 1296.000709] do_syscall_64+0x33/0x40 [ 1296.001074] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1296.001594] RIP: 0033:0x7f33add2bb19 [ 1296.001959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1296.003772] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1296.004511] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1296.005255] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1296.005951] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1296.006672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1296.007384] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:23:56 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:23:56 executing program 7: arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000480)={0x20, 0x0, 'client1\x00', 0x0, "efa0e2e8a4e57ab8", "937634beeccf2455d1cea2e6fb6dfbfdd68d9718ba8cefd191bfb6e75c0f4986"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESDEC=r0], 0xfdef) fsopen(&(0x7f0000000040)='pipefs\x00', 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x2f, 0x81, 0x9, 0x2, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, '\x00', 0xf}, 0x20, 0x80, 0x9, 0x7fffffff}}) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x40, 0x3f, 0x20, 0x37, 0x0, 0x7, 0x20200, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x9, 0x4fb}, 0x800, 0x1, 0x8, 0x1, 0x89c, 0x6, 0x0, 0x0, 0x200, 0x0, 0x7e6a000000000}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xb) fcntl$getflags(0xffffffffffffffff, 0x408) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x3, 0x8, 0x9e, 0x3, 0x0, 0xbe, 0x10180, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x20, 0xffffffffffffff26}, 0x40, 0x7, 0x1, 0x0, 0x4, 0xfff, 0x6, 0x0, 0x8, 0x0, 0x7f}, 0x0, 0x1, 0xffffffffffffffff, 0x9) fsetxattr$security_selinux(r2, &(0x7f0000000100), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x24, 0x24, 0x1, 0x1, 0x2, 0xfe2d, 0x4, 0x1d, 0x1}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r3, 0x3e60) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) [ 1296.133940] audit: type=1400 audit(1707888236.628:155): avc: denied { associate } for pid=9651 comm="syz-executor.7" name="nvram" dev="devtmpfs" ino=99 scontext=system_u:object_r:syslogd_var_lib_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 05:24:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:24:12 executing program 1: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, 0x0) r0 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r0) keyctl$link(0x8, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:24:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:12 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) 05:24:12 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='gid_map\x00') r1 = gettid() r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) syz_open_procfs(r2, &(0x7f0000000040)='net/xfrm_stat\x00') capset(&(0x7f0000000000)={0x19980330, r2}, &(0x7f0000000100)={0x3, 0x0, 0x6cdd, 0x6, 0xffff, 0x9}) capset(&(0x7f0000000240)={0x20080522, r2}, &(0x7f00000015c0)={0x30, 0x1, 0x10, 0x23, 0x6, 0x1ff}) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x3f, 0x6, 0x6, 0x9, 0x0, 0x3ea5, 0x21, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40, 0x1, @perf_config_ext={0x1ff, 0x1}, 0x40068, 0xc79, 0x6, 0x7, 0x2, 0x69, 0x8, 0x0, 0x0, 0x0, 0x85}, r1, 0xd, r0, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r4 = dup2(0xffffffffffffffff, r0) pidfd_getfd(r4, r0, 0x0) preadv(r3, &(0x7f0000000440)=[{&(0x7f0000000140)=""/96, 0x60}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000001c0)=""/100, 0x64}, {&(0x7f00000003c0)=""/114, 0x72}, {&(0x7f00000014c0)=""/238, 0xee}], 0x5, 0x4, 0xd0b) 05:24:12 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:24:12 executing program 7: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, 0x0, 0x1, 0x70bd28, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x4040000) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="c0026db3380d557100"]) 05:24:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1311.855666] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9682 comm=syz-executor.7 [ 1311.861586] FAULT_INJECTION: forcing a failure. [ 1311.861586] name failslab, interval 1, probability 0, space 0, times 0 [ 1311.863643] CPU: 0 PID: 9683 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1311.864716] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1311.865931] Call Trace: [ 1311.866338] dump_stack+0x107/0x167 [ 1311.866884] should_fail.cold+0x5/0xa [ 1311.867448] ? create_object.isra.0+0x3a/0xa20 [ 1311.868137] should_failslab+0x5/0x20 [ 1311.868702] kmem_cache_alloc+0x5b/0x310 [ 1311.869322] create_object.isra.0+0x3a/0xa20 [ 1311.869972] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1311.870733] kmem_cache_alloc+0x159/0x310 [ 1311.871339] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1311.872149] copy_process+0x1c5b/0x7800 [ 1311.872745] ? __lockdep_reset_lock+0x180/0x180 [ 1311.873449] ? mark_lock+0xf5/0x2df0 [ 1311.873997] ? lock_acquire+0x197/0x470 [ 1311.874578] ? find_held_lock+0x2c/0x110 [ 1311.875193] ? __cleanup_sighand+0xb0/0xb0 [ 1311.875826] ? _copy_from_user+0xfb/0x1b0 [ 1311.876441] kernel_clone+0xe7/0x980 [ 1311.876970] ? __lockdep_reset_lock+0x180/0x180 [ 1311.877650] ? create_io_thread+0xf0/0xf0 [ 1311.878260] ? ksys_write+0x21a/0x260 [ 1311.878809] ? lock_downgrade+0x6d0/0x6d0 [ 1311.879421] __do_sys_clone3+0x1e5/0x320 [ 1311.880019] ? __do_sys_clone+0x110/0x110 [ 1311.880654] ? rcu_read_lock_any_held+0x75/0xa0 [ 1311.881345] ? vfs_write+0x354/0xa70 [ 1311.881879] ? fput_many+0x2f/0x1a0 [ 1311.882414] ? ksys_write+0x1a9/0x260 [ 1311.882985] ? __ia32_sys_read+0xb0/0xb0 [ 1311.883583] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1311.884364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1311.885073] ? trace_hardirqs_on+0x5b/0x180 [ 1311.885691] do_syscall_64+0x33/0x40 [ 1311.886229] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1311.886984] RIP: 0033:0x7f33add2bb19 [ 1311.887546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1311.890109] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1311.891195] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1311.892188] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1311.893208] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1311.894266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1311.895262] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:24:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:12 executing program 7: openat(0xffffffffffffffff, 0x0, 0x660002, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@rand_addr=' \x01\x00', @local, @mcast2, 0x101, 0xfc01, 0x0, 0x0, 0x0, 0x1810020}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x401000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@private1, @private2, @local, 0x6, 0x1d24, 0x0, 0x100, 0x80000001, 0x2000040, r2}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20008090}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000380), 0x3, 0x0) ftruncate(r3, 0x4) write$evdev(r4, &(0x7f00000003c0)=[{{0x77359400}, 0x0, 0x2, 0x5}, {{0x77359400}, 0x2, 0x3ae, 0x4}, {{}, 0x17, 0x7, 0x1ff}, {{0x77359400}, 0x15, 0xfffe}], 0x60) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'lo\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'erspan0\x00', r5, 0x10, 0x10, 0xffff, 0x3, {{0xa, 0x4, 0x1, 0x8, 0x28, 0x68, 0x0, 0x0, 0x4, 0x0, @loopback, @private=0xa010101, {[@generic={0x83, 0x11, "cf8757f7a621760ddebe0f39f5d5f9"}]}}}}}) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x1013, r3, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r3, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) 05:24:12 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0x6, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x0, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) dup2(r1, r0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r1, 0x1, 0x4) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000000c0)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x2f}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000001340)=ANY=[@ANYBLOB, @ANYRES32]) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYRESOCT, @ANYRES16=r2, @ANYBLOB="4716eccecadacb1b6e3c29f0e5164d51de97dfd85625fa9611453f1534da85e90f605349b28e68387338703c2cc5db21d80a3ea481eb48a383ae7d8a21013d362c83183151de209c94b680a41decc3a3a30b00b1c2fa8b646a6e201082d3ab225836c6af3ae021ce91e85735ed857781814ea963b08bb94148e38aa174ddce419d3373ea11e445179ccd007302418e8914b250af4e7c04bf22a3b9b5c01e99caf985af23f9a8d9b668ecf0848e0b033bd2647ecd665b76b0a9c730936252e61694260fd21a6fc2ba98359917bfac46"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x0) unshare(0x48020200) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r4, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r4) 05:24:12 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:24:12 executing program 7: lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=@sha1={0x1, "949390a2d95bfa2025e29f79dfe65d164cfe7c01"}, 0x15, 0x1) fspick(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020101000270008000f801", 0x17}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303030303030303030302c00ea68949df7c50cc54e14bb15e65f74f77e0170b03348a6d8508ec56751f88e980be5c327fa443519a827fad8712f6ca8cdb0e4e586fe4560119e04247e33a1f678c77a4b84514735c1a669e6c0f9ee4e6a981752ebed7401095a1af6a954fb4f23f9167d819600bc1b9eb6de8356aa4bcd460e46eb8a415130ceeb21311907079f13eafce39b467f59447f9b1b6d5073eba723e1d16df55221c49c684d44"]) [ 1312.249629] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 05:24:12 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:24:12 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) [ 1312.421918] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1312.474053] FAULT_INJECTION: forcing a failure. [ 1312.474053] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.476162] CPU: 0 PID: 9714 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1312.477341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1312.478762] Call Trace: [ 1312.479175] dump_stack+0x107/0x167 [ 1312.479719] should_fail.cold+0x5/0xa [ 1312.480264] ? create_new_namespaces+0x30/0xb20 [ 1312.480905] should_failslab+0x5/0x20 [ 1312.481431] kmem_cache_alloc+0x5b/0x310 [ 1312.481985] ? cap_capable+0x1cd/0x230 [ 1312.482549] create_new_namespaces+0x30/0xb20 [ 1312.483190] copy_namespaces+0x3fb/0x4f0 [ 1312.483785] copy_process+0x385b/0x7800 [ 1312.484361] ? __lockdep_reset_lock+0x180/0x180 [ 1312.485009] ? mark_lock+0xf5/0x2df0 [ 1312.485560] ? lock_acquire+0x197/0x470 [ 1312.486129] ? __cleanup_sighand+0xb0/0xb0 [ 1312.486759] ? _copy_from_user+0xfb/0x1b0 [ 1312.487361] kernel_clone+0xe7/0x980 [ 1312.487886] ? __lockdep_reset_lock+0x180/0x180 [ 1312.488558] ? create_io_thread+0xf0/0xf0 [ 1312.489170] ? ksys_write+0x21a/0x260 [ 1312.489709] ? lock_downgrade+0x6d0/0x6d0 [ 1312.490312] __do_sys_clone3+0x1e5/0x320 [ 1312.490895] ? __do_sys_clone+0x110/0x110 [ 1312.491509] ? rcu_read_lock_any_held+0x75/0xa0 [ 1312.492173] ? vfs_write+0x354/0xa70 [ 1312.492701] ? fput_many+0x2f/0x1a0 [ 1312.493217] ? ksys_write+0x1a9/0x260 [ 1312.493760] ? __ia32_sys_read+0xb0/0xb0 [ 1312.494352] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1312.495081] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1312.495811] ? trace_hardirqs_on+0x5b/0x180 [ 1312.496441] do_syscall_64+0x33/0x40 [ 1312.496968] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1312.497686] RIP: 0033:0x7f33add2bb19 [ 1312.498222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1312.500740] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1312.501807] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1312.502794] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1312.503787] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1312.504779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1312.505780] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:24:33 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) 05:24:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:33 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:24:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:33 executing program 4: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x252325250fab508e, 0x80010, 0xffffffffffffffff, 0x6448f000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x10000000006, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r4, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ppoll(&(0x7f0000000500)=[{r1, 0x5080}, {r3, 0x8000}, {r0, 0x80}, {r4, 0x41}], 0x4, &(0x7f0000000540)={0x0, 0x3938700}, &(0x7f0000000580)={[0x4]}, 0x8) sendfile(r1, r0, 0x0, 0x4000007ffffffc) r5 = socket$inet6_udp(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x8, 0x6) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000480)={r1, 0x7fff, 0x1, 0x54}) sendmsg$nl_generic(r0, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)={0x244, 0x1f, 0x4, 0x70bd2a, 0x25dfdbfb, {0x1f}, [@nested={0x4, 0x31}, @typed={0x8, 0x96, 0x0, 0x0, @uid=0xee00}, @generic="8943b77fb526ee478b19e8abe61ecabb4de334b4200b1a07d5f338c430fef406d1387305c350cfeda1e46ce6dacefbca92904c0eba61f7d1fe05881bc2f005cda76807c56366b9f85723cd2800a0e659eb86f85b9e2633aea19ec015ba030d14b37918f287eb5ddc8644e2bb4fe3fbb063fdcb3b0b27b0db16110172a0b613c67f47d77c9a4e192b3e11c9761aa3742524b9887269bc211b4e69785b17aeff557cf9dffa602a22fedf0e700e37050284fdd045b742adda7502626163600866dcf13772ddf6002c2a15b6b197", @typed={0x16, 0x64, 0x0, 0x0, @str='{@!.[/-.-\\&.\x16-\x88-}\x00'}, @nested={0x2b, 0x5e, 0x0, 0x1, [@generic="44eed4be134f20911177bff4a33d6a66b3e6325372507b3c1216ce34a302ab432fb7410b2e8379"]}, @nested={0xb4, 0x3, 0x0, 0x1, [@typed={0xa, 0x89, 0x0, 0x0, @str='wlan1\x00'}, @generic="0c3ecac9e98c00ba86d23f24a307b1782483821ffc2fd12508c3e84f9bc0e1027b0342f70f6812533c139f173881373365ff205ecab70e56b11613c00091e50c1f3e69ec99e3ba8b193dc5aa7530cbebd24ccd1bb02aaa6eda3ad8978adfb4a525ec", @typed={0x8, 0x55, 0x0, 0x0, @u32=0x25b2}, @generic="9a8f5bfe54085cef5aeca3bea769ef68a2dfb91faa93a8fcd63a15090a9b8ee6e6d601440809f7aeebadc0de15f0ad618c63", @typed={0x8, 0x7f, 0x0, 0x0, @uid=0xee01}]}, @generic="af69d9dee791e813d3562e5f0d9bdc95a50241bf099335eb721eeba7dfb980abe02de652e54577cba894294907cb870a355bee5c4634e216d2aea929e0fb8a543c4c68ffb1a245e08b9405c1e19b7cc843f1a8997a17edc88ca67dc819"]}, 0x244}, 0x1, 0x0, 0x0, 0x24000840}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 05:24:33 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:24:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:24:33 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:24:33 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000001300)=ANY=[@ANYBLOB="00000000fffffdfd0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000feffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000017d7a6258ba56c75d1e95a5538c93e59db033c4af0e0faf85460245a626153664a6036ecdfa290eee9866bd122047a2328b14ce99a3cf3f9c2679b8daf9f3ddb73219a2abcecc0c21721e09464a8fab2d8d7"]) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r3, 0x6) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x4, 0x0, 0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x14e6}, 0x40002, 0x0, 0x0, 0x4, 0x5, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000000300)={{}, "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"}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000240)=0x67bb, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000100)={0x101, 0x0, 0x0, 'queue0\x00'}) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000080)="48a732e780e917c8c39abb5c103875cdfae65212a079a7df4b06c44d5f2ccf919c10ed450a751559c8c216bff4535f8e344008ae09fc4d50c4afdb44d1dd0e4f211aabe38c2abdba1f2ab36579dc220d10f308076128af5539c9701e92", 0x5d}, 0x68) sendfile(0xffffffffffffffff, r1, 0x0, 0x8) unshare(0x48020200) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000280)=0x4) [ 1333.490233] FAULT_INJECTION: forcing a failure. [ 1333.490233] name failslab, interval 1, probability 0, space 0, times 0 [ 1333.492407] CPU: 1 PID: 9727 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1333.493492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1333.494775] Call Trace: [ 1333.495192] dump_stack+0x107/0x167 [ 1333.495770] should_fail.cold+0x5/0xa [ 1333.496386] ? create_object.isra.0+0x3a/0xa20 [ 1333.497099] should_failslab+0x5/0x20 [ 1333.497699] kmem_cache_alloc+0x5b/0x310 [ 1333.498334] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 1333.499132] create_object.isra.0+0x3a/0xa20 [ 1333.499824] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1333.500644] kmem_cache_alloc+0x159/0x310 [ 1333.501300] create_new_namespaces+0x30/0xb20 [ 1333.502025] copy_namespaces+0x3fb/0x4f0 [ 1333.502673] copy_process+0x385b/0x7800 [ 1333.503306] ? __lockdep_reset_lock+0x180/0x180 [ 1333.504038] ? mark_lock+0xf5/0x2df0 [ 1333.504649] ? lock_acquire+0x197/0x470 [ 1333.505300] ? __cleanup_sighand+0xb0/0xb0 [ 1333.505993] ? _copy_from_user+0xfb/0x1b0 [ 1333.506663] kernel_clone+0xe7/0x980 [ 1333.507257] ? __lockdep_reset_lock+0x180/0x180 [ 1333.507992] ? create_io_thread+0xf0/0xf0 [ 1333.508676] ? ksys_write+0x21a/0x260 [ 1333.509278] ? lock_downgrade+0x6d0/0x6d0 [ 1333.509949] __do_sys_clone3+0x1e5/0x320 [ 1333.510601] ? __do_sys_clone+0x110/0x110 [ 1333.511275] ? rcu_read_lock_any_held+0x75/0xa0 [ 1333.511983] ? vfs_write+0x354/0xa70 [ 1333.512589] ? fput_many+0x2f/0x1a0 [ 1333.513162] ? ksys_write+0x1a9/0x260 [ 1333.513768] ? __ia32_sys_read+0xb0/0xb0 [ 1333.514419] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1333.515254] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1333.516057] ? trace_hardirqs_on+0x5b/0x180 [ 1333.516734] do_syscall_64+0x33/0x40 [ 1333.517327] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1333.518130] RIP: 0033:0x7f33add2bb19 [ 1333.518722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1333.521589] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1333.522763] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1333.523848] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1333.524945] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1333.526016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1333.527089] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:24:34 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:24:34 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:24:34 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 33) [ 1334.138692] FAULT_INJECTION: forcing a failure. [ 1334.138692] name failslab, interval 1, probability 0, space 0, times 0 [ 1334.141569] CPU: 1 PID: 9754 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1334.142640] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1334.143921] Call Trace: [ 1334.144351] dump_stack+0x107/0x167 [ 1334.144942] should_fail.cold+0x5/0xa [ 1334.145551] ? inc_ucount+0x472/0x7f0 [ 1334.146158] should_failslab+0x5/0x20 [ 1334.146754] kmem_cache_alloc_trace+0x55/0x320 [ 1334.147471] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1334.148311] inc_ucount+0x472/0x7f0 [ 1334.148910] ? retire_userns_sysctls+0x80/0x80 [ 1334.149633] ? kmem_cache_alloc+0x159/0x310 [ 1334.150313] ? lock_downgrade+0x6d0/0x6d0 [ 1334.150974] alloc_mnt_ns+0x88/0x420 [ 1334.151567] copy_mnt_ns+0xae/0xa00 [ 1334.152146] ? kmem_cache_alloc+0x2a6/0x310 [ 1334.152841] create_new_namespaces+0xd6/0xb20 [ 1334.153574] copy_namespaces+0x3fb/0x4f0 [ 1334.154235] copy_process+0x385b/0x7800 [ 1334.154873] ? __lockdep_reset_lock+0x180/0x180 [ 1334.155614] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1334.156438] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1334.157300] ? lock_acquire+0x197/0x470 [ 1334.157946] ? __cleanup_sighand+0xb0/0xb0 [ 1334.158624] ? _copy_from_user+0xfb/0x1b0 [ 1334.159285] kernel_clone+0xe7/0x980 [ 1334.159863] ? __lockdep_reset_lock+0x180/0x180 [ 1334.160599] ? create_io_thread+0xf0/0xf0 [ 1334.161270] ? ksys_write+0x21a/0x260 [ 1334.161877] ? lock_downgrade+0x6d0/0x6d0 [ 1334.162539] __do_sys_clone3+0x1e5/0x320 [ 1334.163177] ? __do_sys_clone+0x110/0x110 [ 1334.163851] ? rcu_read_lock_any_held+0x75/0xa0 [ 1334.164590] ? vfs_write+0x354/0xa70 [ 1334.165187] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1334.165909] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1334.166751] ? ksys_write+0x1a9/0x260 [ 1334.167357] ? __ia32_sys_read+0xb0/0xb0 [ 1334.167996] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1334.168824] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1334.169626] ? trace_hardirqs_on+0x5b/0x180 [ 1334.170308] do_syscall_64+0x33/0x40 [ 1334.170901] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1334.171714] RIP: 0033:0x7f33add2bb19 [ 1334.172306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1334.175145] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1334.176336] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1334.177442] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1334.178549] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1334.179667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1334.180787] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:24:34 executing program 7: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fadvise64(0xffffffffffffffff, 0x8000000000001, 0x1, 0x4) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r3, &(0x7f00000000c0), 0x0, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000400)='cpu.pressure\x00', 0x2, 0x0) syz_open_dev$vcsu(&(0x7f0000000300), 0x0, 0x4001) sendfile(0xffffffffffffffff, r3, &(0x7f0000000080)=0x1f, 0x5) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000340)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f00000000c0), 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) io_uring_enter(0xffffffffffffffff, 0x2bc4, 0x3d1, 0x2, &(0x7f00000001c0)={[0x3]}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x3, 0x0, 0x0) 05:24:34 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:24:34 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 34) 05:24:35 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:24:35 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:24:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1334.575691] FAULT_INJECTION: forcing a failure. [ 1334.575691] name failslab, interval 1, probability 0, space 0, times 0 [ 1334.577608] CPU: 1 PID: 9764 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1334.578528] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1334.579633] Call Trace: [ 1334.580008] dump_stack+0x107/0x167 [ 1334.580517] should_fail.cold+0x5/0xa [ 1334.581032] ? create_object.isra.0+0x3a/0xa20 [ 1334.581653] should_failslab+0x5/0x20 [ 1334.582167] kmem_cache_alloc+0x5b/0x310 [ 1334.582720] create_object.isra.0+0x3a/0xa20 [ 1334.583311] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1334.584017] kmem_cache_alloc_trace+0x151/0x320 [ 1334.584642] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1334.585342] inc_ucount+0x472/0x7f0 [ 1334.585844] ? retire_userns_sysctls+0x80/0x80 [ 1334.586450] ? kmem_cache_alloc+0x159/0x310 [ 1334.587022] ? lock_downgrade+0x6d0/0x6d0 [ 1334.587586] alloc_mnt_ns+0x88/0x420 [ 1334.588087] copy_mnt_ns+0xae/0xa00 [ 1334.588587] ? kmem_cache_alloc+0x2a6/0x310 [ 1334.589179] create_new_namespaces+0xd6/0xb20 [ 1334.589786] copy_namespaces+0x3fb/0x4f0 [ 1334.590332] copy_process+0x385b/0x7800 [ 1334.590862] ? __lockdep_reset_lock+0x180/0x180 [ 1334.591478] ? mark_lock+0xf5/0x2df0 [ 1334.591981] ? lock_acquire+0x197/0x470 [ 1334.592535] ? __cleanup_sighand+0xb0/0xb0 [ 1334.593114] ? _copy_from_user+0xfb/0x1b0 [ 1334.593675] kernel_clone+0xe7/0x980 [ 1334.594170] ? __lockdep_reset_lock+0x180/0x180 [ 1334.594788] ? create_io_thread+0xf0/0xf0 [ 1334.595358] ? ksys_write+0x21a/0x260 [ 1334.595864] ? lock_downgrade+0x6d0/0x6d0 [ 1334.596429] __do_sys_clone3+0x1e5/0x320 [ 1334.596969] ? __do_sys_clone+0x110/0x110 [ 1334.597539] ? rcu_read_lock_any_held+0x75/0xa0 [ 1334.598152] ? vfs_write+0x354/0xa70 [ 1334.598653] ? fput_many+0x2f/0x1a0 [ 1334.599139] ? ksys_write+0x1a9/0x260 [ 1334.599646] ? __ia32_sys_read+0xb0/0xb0 [ 1334.600189] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1334.600887] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1334.601565] ? trace_hardirqs_on+0x5b/0x180 [ 1334.602144] do_syscall_64+0x33/0x40 [ 1334.602638] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1334.603312] RIP: 0033:0x7f33add2bb19 [ 1334.603808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1334.606217] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1334.607218] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1334.608153] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1334.609108] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1334.610056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1334.610995] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:24:35 executing program 4: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x252325250fab508e, 0x80010, 0xffffffffffffffff, 0x6448f000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x10000000006, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r4, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ppoll(&(0x7f0000000500)=[{r1, 0x5080}, {r3, 0x8000}, {r0, 0x80}, {r4, 0x41}], 0x4, &(0x7f0000000540)={0x0, 0x3938700}, &(0x7f0000000580)={[0x4]}, 0x8) sendfile(r1, r0, 0x0, 0x4000007ffffffc) r5 = socket$inet6_udp(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x8, 0x6) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000480)={r1, 0x7fff, 0x1, 0x54}) sendmsg$nl_generic(r0, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)={0x244, 0x1f, 0x4, 0x70bd2a, 0x25dfdbfb, {0x1f}, [@nested={0x4, 0x31}, @typed={0x8, 0x96, 0x0, 0x0, @uid=0xee00}, @generic="8943b77fb526ee478b19e8abe61ecabb4de334b4200b1a07d5f338c430fef406d1387305c350cfeda1e46ce6dacefbca92904c0eba61f7d1fe05881bc2f005cda76807c56366b9f85723cd2800a0e659eb86f85b9e2633aea19ec015ba030d14b37918f287eb5ddc8644e2bb4fe3fbb063fdcb3b0b27b0db16110172a0b613c67f47d77c9a4e192b3e11c9761aa3742524b9887269bc211b4e69785b17aeff557cf9dffa602a22fedf0e700e37050284fdd045b742adda7502626163600866dcf13772ddf6002c2a15b6b197", @typed={0x16, 0x64, 0x0, 0x0, @str='{@!.[/-.-\\&.\x16-\x88-}\x00'}, @nested={0x2b, 0x5e, 0x0, 0x1, [@generic="44eed4be134f20911177bff4a33d6a66b3e6325372507b3c1216ce34a302ab432fb7410b2e8379"]}, @nested={0xb4, 0x3, 0x0, 0x1, [@typed={0xa, 0x89, 0x0, 0x0, @str='wlan1\x00'}, @generic="0c3ecac9e98c00ba86d23f24a307b1782483821ffc2fd12508c3e84f9bc0e1027b0342f70f6812533c139f173881373365ff205ecab70e56b11613c00091e50c1f3e69ec99e3ba8b193dc5aa7530cbebd24ccd1bb02aaa6eda3ad8978adfb4a525ec", @typed={0x8, 0x55, 0x0, 0x0, @u32=0x25b2}, @generic="9a8f5bfe54085cef5aeca3bea769ef68a2dfb91faa93a8fcd63a15090a9b8ee6e6d601440809f7aeebadc0de15f0ad618c63", @typed={0x8, 0x7f, 0x0, 0x0, @uid=0xee01}]}, @generic="af69d9dee791e813d3562e5f0d9bdc95a50241bf099335eb721eeba7dfb980abe02de652e54577cba894294907cb870a355bee5c4634e216d2aea929e0fb8a543c4c68ffb1a245e08b9405c1e19b7cc843f1a8997a17edc88ca67dc819"]}, 0x244}, 0x1, 0x0, 0x0, 0x24000840}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 05:24:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1334.957855] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 1334.958706] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 1334.959297] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 1334.960427] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 1334.960982] print_req_error: 7 callbacks suppressed [ 1334.960992] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 8 prio class 0 [ 1334.962144] buffer_io_error: 6 callbacks suppressed [ 1334.962150] Buffer I/O error on dev sr0, logical block 0, async page read [ 1334.963118] Buffer I/O error on dev sr0, logical block 1, async page read [ 1334.963630] Buffer I/O error on dev sr0, logical block 2, async page read [ 1334.964183] Buffer I/O error on dev sr0, logical block 3, async page read [ 1334.964761] Buffer I/O error on dev sr0, logical block 4, async page read [ 1334.965357] Buffer I/O error on dev sr0, logical block 5, async page read [ 1334.965913] Buffer I/O error on dev sr0, logical block 6, async page read [ 1334.966503] Buffer I/O error on dev sr0, logical block 7, async page read [ 1334.968648] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.969379] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1334.970564] Buffer I/O error on dev sr0, logical block 0, async page read [ 1334.973570] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.974304] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1334.975495] Buffer I/O error on dev sr0, logical block 1, async page read [ 1334.978453] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.979171] blk_update_request: I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1334.981535] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.982230] blk_update_request: I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1334.983529] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.984215] blk_update_request: I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1334.986634] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.987327] blk_update_request: I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1334.988648] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.989319] blk_update_request: I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1334.990639] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.991377] blk_update_request: I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1334.992718] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.993393] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1334.994678] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.997068] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.997865] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1334.998734] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.002350] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.003586] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.007301] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.007953] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.008677] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.009417] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.010097] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.011372] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.011990] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.012695] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.013369] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.014096] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.015307] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.016591] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.021517] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.022338] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.022992] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.023704] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.030547] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.031457] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.032140] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.033394] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.034030] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.034718] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.035378] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.036044] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.036734] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.037483] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1335.057658] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 05:24:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:50 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:50 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 35) 05:24:50 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:24:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:24:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:24:50 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1349.787039] FAULT_INJECTION: forcing a failure. [ 1349.787039] name failslab, interval 1, probability 0, space 0, times 0 [ 1349.788316] CPU: 1 PID: 9799 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1349.788872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1349.789535] Call Trace: [ 1349.789757] dump_stack+0x107/0x167 [ 1349.790065] should_fail.cold+0x5/0xa [ 1349.790386] ? alloc_mnt_ns+0xce/0x420 [ 1349.790706] should_failslab+0x5/0x20 [ 1349.791022] kmem_cache_alloc_trace+0x55/0x320 [ 1349.791395] alloc_mnt_ns+0xce/0x420 [ 1349.791704] copy_mnt_ns+0xae/0xa00 [ 1349.792006] ? kmem_cache_alloc+0x2a6/0x310 [ 1349.792367] create_new_namespaces+0xd6/0xb20 [ 1349.792746] copy_namespaces+0x3fb/0x4f0 [ 1349.793081] copy_process+0x385b/0x7800 [ 1349.793408] ? __lockdep_reset_lock+0x180/0x180 [ 1349.793784] ? mark_lock+0xf5/0x2df0 [ 1349.794092] ? lock_acquire+0x197/0x470 [ 1349.794430] ? __cleanup_sighand+0xb0/0xb0 [ 1349.794786] ? _copy_from_user+0xfb/0x1b0 [ 1349.795128] kernel_clone+0xe7/0x980 [ 1349.795435] ? __lockdep_reset_lock+0x180/0x180 [ 1349.795815] ? create_io_thread+0xf0/0xf0 [ 1349.796159] ? ksys_write+0x21a/0x260 [ 1349.796462] ? lock_downgrade+0x6d0/0x6d0 [ 1349.796800] __do_sys_clone3+0x1e5/0x320 [ 1349.797134] ? __do_sys_clone+0x110/0x110 [ 1349.797487] ? rcu_read_lock_any_held+0x75/0xa0 [ 1349.797858] ? vfs_write+0x354/0xa70 [ 1349.798155] ? fput_many+0x2f/0x1a0 [ 1349.798452] ? ksys_write+0x1a9/0x260 [ 1349.798765] ? __ia32_sys_read+0xb0/0xb0 [ 1349.799097] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1349.799515] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1349.799920] ? trace_hardirqs_on+0x5b/0x180 [ 1349.800279] do_syscall_64+0x33/0x40 [ 1349.800587] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1349.801004] RIP: 0033:0x7f33add2bb19 [ 1349.801306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1349.802776] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1349.803396] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1349.803970] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1349.804553] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1349.805136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1349.805714] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:24:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:50 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000001500)=[{&(0x7f0000000140)="1f", 0x1}], 0x1, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @none, 0x0, 0x7}, 0xe) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x6, @any, 0xa41}, 0xe) bind$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @none, 0x0, 0x7}, 0xe) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x65d, 0x7, 0x6, 0x100, 0x5}, {0x9, 0x5, 0x7b5, 0x6, 0x6, 0xfffffffffffffffd}], ['\x00', '\x00']}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x8020}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r3, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000001cc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001c80)={&(0x7f000000b2c0)=ANY=[@ANYBLOB="3c000aab0506000000b9eebd", @ANYRES16=0x0, @ANYBLOB="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"], 0x23c}, 0x1, 0x0, 0x0, 0x4800}, 0x80) recvmmsg(r3, &(0x7f000000ae00)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000080)=""/17, 0x11}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/138, 0x8a}, {&(0x7f0000000400)=""/199, 0xc7}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000600)=""/44, 0x2c}], 0x8, &(0x7f00000006c0)=""/68, 0x44}, 0x9}, {{&(0x7f0000000740)=@rc, 0x80, &(0x7f0000000a80)=[{&(0x7f00000007c0)=""/121, 0x79}, {&(0x7f0000000840)=""/189, 0xbd}, {&(0x7f0000000900)=""/238, 0xee}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/4096, 0x1000}, {&(0x7f0000000a00)=""/78, 0x4e}, {&(0x7f0000004e00)=""/4096, 0x1000}], 0x7, &(0x7f0000000b00)=""/174, 0xae}, 0xffffffff}, {{&(0x7f0000000bc0)=@caif, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000c40)=""/53, 0x35}], 0x1, &(0x7f0000000cc0)=""/58, 0x3a}, 0x8}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000d00)}, {&(0x7f0000000d40)=""/62, 0x3e}], 0x2, &(0x7f0000005e00)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000000dc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000e40)=""/19, 0x13}, {&(0x7f0000000e80)=""/2, 0x2}], 0x2, &(0x7f0000000f00)=""/133, 0x85}, 0x137}, {{&(0x7f0000000fc0)=@rc={0x1f, @none}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001040)=""/61, 0x3d}, {&(0x7f0000001080)=""/134, 0x86}], 0x2, &(0x7f0000001180)=""/88, 0x58}, 0x1}, {{&(0x7f0000001200)=@ax25={{}, [@null, @netrom, @remote, @remote, @default, @remote, @default, @null]}, 0x80, &(0x7f0000001340)=[{&(0x7f0000001280)=""/136, 0x88}], 0x1, &(0x7f0000001380)=""/100, 0x64}, 0x6}, {{&(0x7f0000001400)=@tipc, 0x80, &(0x7f0000001900)=[{&(0x7f0000001480)=""/115, 0x73}, {&(0x7f0000001540)=""/39, 0x27}, {&(0x7f0000001580)=""/169, 0xa9}, {&(0x7f0000001640)=""/216, 0xd8}, {&(0x7f0000001740)=""/138, 0x8a}, {&(0x7f0000001800)=""/76, 0x4c}, {&(0x7f0000001880)=""/102, 0x66}], 0x7, &(0x7f0000001980)=""/184, 0xb8}, 0x7fffffff}, {{&(0x7f0000001a40)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001ac0)=""/34, 0x22}, {&(0x7f0000006e00)=""/4096, 0x1000}, {&(0x7f0000007e00)=""/4096, 0x1000}, {&(0x7f0000008e00)=""/4096, 0x1000}, {&(0x7f000000b540)=""/4106, 0x100a}], 0x5, &(0x7f0000001b80)=""/141, 0x8d}, 0x8}], 0x9, 0x40002000, &(0x7f0000001c40)={0x77359400}) close(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r4, &(0x7f0000001500)=[{&(0x7f0000000140)="1f", 0x1}], 0x1, 0x0, 0x0) 05:24:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:50 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, 0xffffffffffffffff, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:24:50 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 36) 05:24:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:50 executing program 4: times(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa0}, 0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x4000000, 0x2, 0x3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) clone3(&(0x7f0000000500)={0x200000000, 0x0, &(0x7f0000000340), &(0x7f0000000380), {0x1e}, &(0x7f00000003c0)=""/53, 0x35, &(0x7f0000000440)=""/114, 0x0}, 0x58) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x24000800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = dup2(r1, 0xffffffffffffffff) ioctl$TCFLSH(r2, 0x540b, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) [ 1350.178672] FAULT_INJECTION: forcing a failure. [ 1350.178672] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.180733] CPU: 0 PID: 9823 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1350.181233] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1350.181788] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.181796] Call Trace: [ 1350.181821] dump_stack+0x107/0x167 [ 1350.184728] should_fail.cold+0x5/0xa [ 1350.185333] ? create_object.isra.0+0x3a/0xa20 [ 1350.186056] should_failslab+0x5/0x20 [ 1350.186638] kmem_cache_alloc+0x5b/0x310 [ 1350.187246] create_object.isra.0+0x3a/0xa20 [ 1350.187934] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1350.188711] kmem_cache_alloc_trace+0x151/0x320 [ 1350.189442] alloc_mnt_ns+0xce/0x420 [ 1350.190004] copy_mnt_ns+0xae/0xa00 [ 1350.190536] ? kmem_cache_alloc+0x2a6/0x310 [ 1350.191209] create_new_namespaces+0xd6/0xb20 [ 1350.191883] copy_namespaces+0x3fb/0x4f0 [ 1350.192500] copy_process+0x385b/0x7800 [ 1350.193124] ? __lockdep_reset_lock+0x180/0x180 [ 1350.193816] ? mark_lock+0xf5/0x2df0 [ 1350.194409] ? lock_acquire+0x197/0x470 [ 1350.195040] ? __cleanup_sighand+0xb0/0xb0 [ 1350.195722] ? _copy_from_user+0xfb/0x1b0 [ 1350.196383] kernel_clone+0xe7/0x980 [ 1350.196968] ? __lockdep_reset_lock+0x180/0x180 [ 1350.197700] ? create_io_thread+0xf0/0xf0 [ 1350.198362] ? ksys_write+0x21a/0x260 [ 1350.198949] ? lock_downgrade+0x6d0/0x6d0 [ 1350.199577] __do_sys_clone3+0x1e5/0x320 [ 1350.200173] ? __do_sys_clone+0x110/0x110 [ 1350.200807] ? rcu_read_lock_any_held+0x75/0xa0 [ 1350.201513] ? vfs_write+0x354/0xa70 [ 1350.202102] ? fput_many+0x2f/0x1a0 [ 1350.202674] ? ksys_write+0x1a9/0x260 [ 1350.203264] ? __ia32_sys_read+0xb0/0xb0 [ 1350.203864] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.204646] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.205389] ? trace_hardirqs_on+0x5b/0x180 [ 1350.206060] do_syscall_64+0x33/0x40 [ 1350.206646] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1350.207401] RIP: 0033:0x7f33add2bb19 [ 1350.207976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.210748] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1350.211907] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1350.213018] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1350.214119] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1350.215212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1350.216286] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:24:50 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, 0xffffffffffffffff, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1350.272923] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:24:51 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:24:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:51 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 37) 05:24:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:24:51 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000580)={0x0, "f393fd5b4ba533e71dce9cda81af19b1"}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000001580)={0x3, 0x4, {0x5, @usage, 0x0, 0x9, 0x6, 0x7, 0x6, 0x7, 0x82, @usage=0x200, 0xfff, 0xf9, [0x9, 0xfffffffffffffffb, 0xffffffffffffff6c, 0x1000, 0x6]}, {0x3, @struct={0x8, 0x2}, r1, 0x81, 0xffffffff00000001, 0x8, 0x4, 0x0, 0x20, @usage=0xfffffffffffffff8, 0x10000, 0x80, [0x8, 0xaf10, 0x5c, 0x1, 0x0, 0x8]}, {0x4, @usage=0x1ff, 0x0, 0x4, 0x100000001, 0x7, 0xfc2, 0x434, 0x14, @struct={0xffffdadb, 0x7}, 0x5, 0x1ff, [0x5ff, 0x3ff, 0x6, 0x6, 0x1, 0xc9d]}, {0x8000, 0xffffffffffff2e50, 0x9}}) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x46e2, 0x3) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(r3, &(0x7f0000000100)='./file0\x00', 0x4000, 0x1) socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r3, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESHEX=r2, @ANYRESDEC, @ANYRES64], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r3, 0x3, 0x3, 0x8000008000) [ 1350.669908] FAULT_INJECTION: forcing a failure. [ 1350.669908] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.671380] CPU: 1 PID: 9839 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1350.671934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.672606] Call Trace: [ 1350.672826] dump_stack+0x107/0x167 [ 1350.673127] should_fail.cold+0x5/0xa [ 1350.673444] ? alloc_vfsmnt+0x23/0x680 [ 1350.673764] should_failslab+0x5/0x20 [ 1350.674075] kmem_cache_alloc+0x5b/0x310 [ 1350.674407] ? lock_release+0x680/0x680 [ 1350.674733] alloc_vfsmnt+0x23/0x680 [ 1350.675039] clone_mnt+0x6c/0xce0 [ 1350.675330] copy_tree+0xfe/0xa60 [ 1350.675618] ? down_write_killable+0x180/0x180 [ 1350.676008] copy_mnt_ns+0x144/0xa00 [ 1350.676314] ? kmem_cache_alloc+0x2a6/0x310 [ 1350.676676] create_new_namespaces+0xd6/0xb20 [ 1350.677050] copy_namespaces+0x3fb/0x4f0 [ 1350.677383] copy_process+0x385b/0x7800 [ 1350.677706] ? __lockdep_reset_lock+0x180/0x180 [ 1350.678077] ? mark_lock+0xf5/0x2df0 [ 1350.678381] ? lock_acquire+0x197/0x470 [ 1350.678717] ? __cleanup_sighand+0xb0/0xb0 [ 1350.679075] ? _copy_from_user+0xfb/0x1b0 [ 1350.679420] kernel_clone+0xe7/0x980 [ 1350.679720] ? __lockdep_reset_lock+0x180/0x180 [ 1350.680095] ? create_io_thread+0xf0/0xf0 [ 1350.680440] ? ksys_write+0x21a/0x260 [ 1350.680758] ? lock_downgrade+0x6d0/0x6d0 [ 1350.681100] __do_sys_clone3+0x1e5/0x320 [ 1350.681426] ? __do_sys_clone+0x110/0x110 [ 1350.681777] ? rcu_read_lock_any_held+0x75/0xa0 [ 1350.682147] ? vfs_write+0x354/0xa70 [ 1350.682453] ? fput_many+0x2f/0x1a0 [ 1350.682748] ? ksys_write+0x1a9/0x260 [ 1350.683056] ? __ia32_sys_read+0xb0/0xb0 [ 1350.683391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.683812] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.684229] ? trace_hardirqs_on+0x5b/0x180 [ 1350.684584] do_syscall_64+0x33/0x40 [ 1350.684884] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1350.685294] RIP: 0033:0x7f33add2bb19 [ 1350.685594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.687065] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1350.687678] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1350.688252] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1350.688833] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1350.689402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1350.689972] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:24:51 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, 0xffffffffffffffff, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:24:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="30000000180000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="140005806c"], 0x30}}, 0x0) 05:24:51 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 38) 05:24:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1350.913607] FAULT_INJECTION: forcing a failure. [ 1350.913607] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.915638] CPU: 0 PID: 9856 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1350.916657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.917855] Call Trace: [ 1350.918248] dump_stack+0x107/0x167 [ 1350.918794] should_fail.cold+0x5/0xa [ 1350.919371] ? create_object.isra.0+0x3a/0xa20 [ 1350.920094] should_failslab+0x5/0x20 [ 1350.920675] kmem_cache_alloc+0x5b/0x310 [ 1350.921282] ? kfree+0x1ab/0x340 [ 1350.921818] create_object.isra.0+0x3a/0xa20 [ 1350.922502] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1350.923274] kmem_cache_alloc+0x159/0x310 [ 1350.923924] ? lock_release+0x680/0x680 [ 1350.924572] alloc_vfsmnt+0x23/0x680 [ 1350.925156] clone_mnt+0x6c/0xce0 [ 1350.925709] copy_tree+0xfe/0xa60 [ 1350.926251] ? down_write_killable+0x180/0x180 [ 1350.926979] copy_mnt_ns+0x144/0xa00 [ 1350.927560] ? kmem_cache_alloc+0x2a6/0x310 [ 1350.928240] create_new_namespaces+0xd6/0xb20 [ 1350.928918] copy_namespaces+0x3fb/0x4f0 [ 1350.929528] copy_process+0x385b/0x7800 [ 1350.930110] ? __lockdep_reset_lock+0x180/0x180 [ 1350.930827] ? mark_lock+0xf5/0x2df0 [ 1350.931416] ? lock_acquire+0x197/0x470 [ 1350.932056] ? __cleanup_sighand+0xb0/0xb0 [ 1350.932711] ? _copy_from_user+0xfb/0x1b0 [ 1350.933356] kernel_clone+0xe7/0x980 [ 1350.933953] ? __lockdep_reset_lock+0x180/0x180 [ 1350.934688] ? create_io_thread+0xf0/0xf0 [ 1350.935311] ? ksys_write+0x21a/0x260 [ 1350.935894] ? lock_downgrade+0x6d0/0x6d0 [ 1350.936549] __do_sys_clone3+0x1e5/0x320 [ 1350.937198] ? __do_sys_clone+0x110/0x110 [ 1350.937874] ? rcu_read_lock_any_held+0x75/0xa0 [ 1350.938577] ? vfs_write+0x354/0xa70 [ 1350.939162] ? fput_many+0x2f/0x1a0 [ 1350.939728] ? ksys_write+0x1a9/0x260 [ 1350.940323] ? __ia32_sys_read+0xb0/0xb0 [ 1350.940965] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.941747] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.942510] ? trace_hardirqs_on+0x5b/0x180 [ 1350.943181] do_syscall_64+0x33/0x40 [ 1350.943755] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1350.944552] RIP: 0033:0x7f33add2bb19 [ 1350.945117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.947929] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1350.949057] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1350.950158] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1350.951261] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1350.952374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1350.953474] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:25:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:25:07 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:25:07 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:25:07 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) r3 = syz_io_uring_setup(0x21, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000140), &(0x7f0000002a40)) io_uring_enter(r3, 0x76d3, 0x0, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) close_range(r3, r4, 0x2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100", @ANYRES32=r1, @ANYBLOB="00000000000000002e2f66696c6530004f3373c2f9e22dd629892577ceb0da43aa021b9f067f2c0d"]) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000000080)) perf_event_open(&(0x7f0000000000)={0x6, 0x80, 0x5, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:25:07 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 39) 05:25:07 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:25:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:25:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1366.824628] FAULT_INJECTION: forcing a failure. [ 1366.824628] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.826875] CPU: 1 PID: 9876 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1366.827979] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1366.829346] Call Trace: [ 1366.829758] dump_stack+0x107/0x167 [ 1366.830373] should_fail.cold+0x5/0xa [ 1366.831002] ? create_object.isra.0+0x3a/0xa20 [ 1366.831762] should_failslab+0x5/0x20 [ 1366.832348] kmem_cache_alloc+0x5b/0x310 [ 1366.832995] create_object.isra.0+0x3a/0xa20 [ 1366.833685] kmemleak_alloc_percpu+0xa0/0x100 [ 1366.834388] pcpu_alloc+0x4e2/0x1240 [ 1366.834990] alloc_vfsmnt+0xfd/0x680 [ 1366.835574] clone_mnt+0x6c/0xce0 [ 1366.836122] copy_tree+0xfe/0xa60 [ 1366.836681] ? down_write_killable+0x180/0x180 [ 1366.837412] copy_mnt_ns+0x144/0xa00 [ 1366.837990] ? kmem_cache_alloc+0x2a6/0x310 [ 1366.838713] create_new_namespaces+0xd6/0xb20 [ 1366.839411] copy_namespaces+0x3fb/0x4f0 [ 1366.840063] copy_process+0x385b/0x7800 [ 1366.840682] ? __lockdep_reset_lock+0x180/0x180 [ 1366.841401] ? mark_lock+0xf5/0x2df0 [ 1366.842034] ? lock_acquire+0x197/0x470 [ 1366.842718] ? __cleanup_sighand+0xb0/0xb0 [ 1366.843432] ? _copy_from_user+0xfb/0x1b0 [ 1366.844129] kernel_clone+0xe7/0x980 [ 1366.844732] ? __lockdep_reset_lock+0x180/0x180 [ 1366.845474] ? create_io_thread+0xf0/0xf0 [ 1366.846139] ? ksys_write+0x21a/0x260 [ 1366.846730] ? lock_downgrade+0x6d0/0x6d0 [ 1366.847394] __do_sys_clone3+0x1e5/0x320 [ 1366.848038] ? __do_sys_clone+0x110/0x110 [ 1366.848723] ? rcu_read_lock_any_held+0x75/0xa0 [ 1366.849435] ? vfs_write+0x354/0xa70 [ 1366.850061] ? fput_many+0x2f/0x1a0 [ 1366.850627] ? ksys_write+0x1a9/0x260 [ 1366.851232] ? __ia32_sys_read+0xb0/0xb0 [ 1366.851889] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1366.852751] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1366.853586] ? trace_hardirqs_on+0x5b/0x180 [ 1366.854310] do_syscall_64+0x33/0x40 [ 1366.854921] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1366.855742] RIP: 0033:0x7f33add2bb19 [ 1366.856364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1366.859283] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1366.860451] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1366.861617] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1366.862726] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1366.863825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1366.864958] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:25:07 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:25:07 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, 0xffffffffffffffff, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:25:07 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:25:07 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:25:07 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="0171c200000000000000000086dd6096033f00303a00fc020000000000000000000000000000ff1200000000000000000000000000010200907800000000600009e60000000000000000000000000000ffffac1e0001fe8000000000000000000000000000bb"], 0x0) syz_emit_ethernet(0xf, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)={0x1, 0x4, [0x108, 0xb7e, 0xd85, 0xf2f]}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0xa) r1 = gettid() setpgid(0x0, r1) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8, 0x7f, 0x1, 0x7a, 0x0, 0x4, 0x1, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0xc300, 0x4, 0x1ff, 0x4, 0xfffffffffffffff9, 0x4, 0x7fff, 0x0, 0xffff0001, 0x0, 0x2f}, r1, 0x4, r0, 0x2) ptrace(0x8, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffff0091004600810048000806000108000002218cad541700ac1e000100"/50], &(0x7f0000000140)={0x1, 0x1, [0xb65, 0x6cb, 0xe93, 0xd]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x412100, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400), 0x102, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000440)={'vlan0\x00'}) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x50111, 0xffffffffffffffff, 0x3) ptrace$getenv(0x4201, r1, 0xba, &(0x7f0000000200)) recvfrom(0xffffffffffffffff, &(0x7f0000000280)=""/212, 0xd4, 0x40000000, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)={0x8020}) 05:25:08 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 40) 05:25:08 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:25:08 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)={0x200000, 0x100, 0x2}, 0x18) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000140)='.pending_reads\x00', 0x0, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0xca}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x3) r5 = signalfd(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x410a80) r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r6, 0xc0189373, &(0x7f0000000200)=ANY=[@ANYBLOB="01000004f429bde0a30158ab0042a79e40bd492d04bda6f12001211b865351f4e9c168f4", @ANYRES32=r5, @ANYBLOB="ff7f0000000000002e2f66696c653000"]) ioctl$AUTOFS_DEV_IOCTL_VERSION(r8, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r3, 0x80489439, 0x0) lseek(r4, 0x0, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x128) copy_file_range(r9, 0x0, r4, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) [ 1367.631578] FAULT_INJECTION: forcing a failure. [ 1367.631578] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.633374] CPU: 1 PID: 9907 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1367.634224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1367.635178] Call Trace: [ 1367.635527] dump_stack+0x107/0x167 [ 1367.635987] should_fail.cold+0x5/0xa [ 1367.636473] ? create_object.isra.0+0x3a/0xa20 [ 1367.637052] should_failslab+0x5/0x20 [ 1367.637527] kmem_cache_alloc+0x5b/0x310 [ 1367.638042] ? mark_held_locks+0x9e/0xe0 [ 1367.638567] create_object.isra.0+0x3a/0xa20 [ 1367.639094] kmemleak_alloc_percpu+0xa0/0x100 [ 1367.639663] pcpu_alloc+0x4e2/0x1240 [ 1367.640147] alloc_vfsmnt+0xfd/0x680 [ 1367.640619] clone_mnt+0x6c/0xce0 [ 1367.641081] copy_tree+0xfe/0xa60 [ 1367.641519] ? down_write_killable+0x180/0x180 [ 1367.642103] copy_mnt_ns+0x144/0xa00 [ 1367.642580] ? kmem_cache_alloc+0x2a6/0x310 [ 1367.643131] create_new_namespaces+0xd6/0xb20 [ 1367.643703] copy_namespaces+0x3fb/0x4f0 [ 1367.644219] copy_process+0x385b/0x7800 [ 1367.644691] ? __lockdep_reset_lock+0x180/0x180 [ 1367.645283] ? mark_lock+0xf5/0x2df0 [ 1367.645764] ? lock_acquire+0x197/0x470 [ 1367.646296] ? __cleanup_sighand+0xb0/0xb0 [ 1367.646844] ? _copy_from_user+0xfb/0x1b0 [ 1367.647367] kernel_clone+0xe7/0x980 [ 1367.647835] ? __lockdep_reset_lock+0x180/0x180 [ 1367.648423] ? create_io_thread+0xf0/0xf0 [ 1367.648955] ? ksys_write+0x21a/0x260 [ 1367.649427] ? lock_downgrade+0x6d0/0x6d0 [ 1367.649919] __do_sys_clone3+0x1e5/0x320 [ 1367.650429] ? __do_sys_clone+0x110/0x110 [ 1367.650964] ? rcu_read_lock_any_held+0x75/0xa0 [ 1367.651542] ? vfs_write+0x354/0xa70 [ 1367.652008] ? fput_many+0x2f/0x1a0 [ 1367.652465] ? ksys_write+0x1a9/0x260 [ 1367.652947] ? __ia32_sys_read+0xb0/0xb0 [ 1367.653451] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1367.654091] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1367.654719] ? trace_hardirqs_on+0x5b/0x180 [ 1367.655260] do_syscall_64+0x33/0x40 [ 1367.655719] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1367.656344] RIP: 0033:0x7f33add2bb19 [ 1367.656807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1367.659046] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1367.659976] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1367.660799] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1367.661667] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1367.662494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1367.663358] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:25:24 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:25:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:25:24 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 41) 05:25:25 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r1, &(0x7f0000000580)='pagemap\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x80e41, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="30000000040000000000000001"], 0x30}}, 0x0) r4 = mq_open(&(0x7f00000004c0)='\\{-\x00', 0x840, 0x20, &(0x7f0000000500)={0xff, 0x7f, 0x3f, 0x3272}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000540)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00']) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0, {0x8001}}, './file0\x00'}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 05:25:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="b8000000130001000000110000000000ffffffff000000000000000000000000ff02000000000000000000000040000100000000000000000a00003c00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/112], 0xb8}}, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) ioprio_set$uid(0x3, 0x0, 0x4004) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) socket(0x5, 0x6, 0x7f) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340), 0x800) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000001c0)={0x4, 0x1, 0x2, 0x3, 0x2, [{0x210, 0x9, 0x8, '\x00', 0x8}, {0x4, 0xa7, 0x6, '\x00', 0x2000}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x1000000, [{0x7, 0x9}]}, 0xc, 0x2) 05:25:25 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:25:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:25:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1384.577664] FAULT_INJECTION: forcing a failure. [ 1384.577664] name failslab, interval 1, probability 0, space 0, times 0 [ 1384.579649] CPU: 1 PID: 9929 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1384.580673] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1384.581903] Call Trace: [ 1384.582301] dump_stack+0x107/0x167 [ 1384.582848] should_fail.cold+0x5/0xa [ 1384.583418] ? alloc_vfsmnt+0x23/0x680 [ 1384.584005] should_failslab+0x5/0x20 [ 1384.584571] kmem_cache_alloc+0x5b/0x310 [ 1384.585180] ? rwlock_bug.part.0+0x90/0x90 [ 1384.585814] alloc_vfsmnt+0x23/0x680 [ 1384.586371] clone_mnt+0x6c/0xce0 [ 1384.586891] ? is_subdir+0x1a8/0x320 [ 1384.587441] copy_tree+0x3b0/0xa60 [ 1384.587988] copy_mnt_ns+0x144/0xa00 [ 1384.588552] ? kmem_cache_alloc+0x2a6/0x310 [ 1384.589223] create_new_namespaces+0xd6/0xb20 [ 1384.589914] copy_namespaces+0x3fb/0x4f0 [ 1384.590535] copy_process+0x385b/0x7800 [ 1384.591133] ? __lockdep_reset_lock+0x180/0x180 [ 1384.591830] ? mark_lock+0xf5/0x2df0 [ 1384.592395] ? lock_acquire+0x197/0x470 [ 1384.593027] ? __cleanup_sighand+0xb0/0xb0 [ 1384.593671] ? _copy_from_user+0xfb/0x1b0 [ 1384.594297] kernel_clone+0xe7/0x980 [ 1384.594848] ? __lockdep_reset_lock+0x180/0x180 [ 1384.595536] ? create_io_thread+0xf0/0xf0 [ 1384.596167] ? ksys_write+0x21a/0x260 [ 1384.596741] ? lock_downgrade+0x6d0/0x6d0 [ 1384.597381] __do_sys_clone3+0x1e5/0x320 [ 1384.597989] ? __do_sys_clone+0x110/0x110 [ 1384.598630] ? rcu_read_lock_any_held+0x75/0xa0 [ 1384.599317] ? vfs_write+0x354/0xa70 [ 1384.599879] ? fput_many+0x2f/0x1a0 [ 1384.600431] ? ksys_write+0x1a9/0x260 [ 1384.601003] ? __ia32_sys_read+0xb0/0xb0 [ 1384.601616] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1384.602390] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1384.603145] ? trace_hardirqs_on+0x5b/0x180 [ 1384.603802] do_syscall_64+0x33/0x40 [ 1384.604353] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1384.605118] RIP: 0033:0x7f33add2bb19 [ 1384.605689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1384.608492] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1384.609672] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1384.610744] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1384.611826] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1384.612915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1384.614002] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 [ 1384.630594] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=9928 comm=syz-executor.4 05:25:25 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:25:25 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 42) 05:25:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000040)=0x40, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000340)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x40, 0x5200}, 0x40) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast2, 0xd08}, 0x1c) r2 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000001c0)={'veth1_macvtap\x00'}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(r4, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) syz_io_uring_setup(0x5af6, &(0x7f0000000380)={0x0, 0x942a, 0x20, 0x0, 0x87, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fed000/0x10000)=nil, &(0x7f0000000400), &(0x7f0000000440)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) [ 1385.023415] FAULT_INJECTION: forcing a failure. [ 1385.023415] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.025337] CPU: 1 PID: 9948 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1385.026370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1385.027605] Call Trace: [ 1385.027943] dump_stack+0x107/0x167 [ 1385.028394] should_fail.cold+0x5/0xa [ 1385.028971] ? create_object.isra.0+0x3a/0xa20 [ 1385.029672] should_failslab+0x5/0x20 [ 1385.030251] kmem_cache_alloc+0x5b/0x310 [ 1385.030870] ? find_held_lock+0x2c/0x110 [ 1385.031503] create_object.isra.0+0x3a/0xa20 [ 1385.032177] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1385.032954] kmem_cache_alloc+0x159/0x310 [ 1385.033583] ? rwlock_bug.part.0+0x90/0x90 [ 1385.034233] alloc_vfsmnt+0x23/0x680 [ 1385.034803] clone_mnt+0x6c/0xce0 [ 1385.035332] ? is_subdir+0x1a8/0x320 [ 1385.035905] copy_tree+0x3b0/0xa60 [ 1385.036468] copy_mnt_ns+0x144/0xa00 [ 1385.037046] ? kmem_cache_alloc+0x2a6/0x310 [ 1385.037704] create_new_namespaces+0xd6/0xb20 [ 1385.038404] copy_namespaces+0x3fb/0x4f0 [ 1385.039039] copy_process+0x385b/0x7800 [ 1385.039651] ? __lockdep_reset_lock+0x180/0x180 [ 1385.040379] ? mark_lock+0xf5/0x2df0 [ 1385.040968] ? lock_acquire+0x197/0x470 [ 1385.041607] ? __cleanup_sighand+0xb0/0xb0 [ 1385.042286] ? _copy_from_user+0xfb/0x1b0 [ 1385.042937] kernel_clone+0xe7/0x980 [ 1385.043521] ? __lockdep_reset_lock+0x180/0x180 [ 1385.044241] ? create_io_thread+0xf0/0xf0 [ 1385.044900] ? ksys_write+0x21a/0x260 [ 1385.045499] ? lock_downgrade+0x6d0/0x6d0 [ 1385.046156] __do_sys_clone3+0x1e5/0x320 [ 1385.046798] ? __do_sys_clone+0x110/0x110 [ 1385.047456] ? rcu_read_lock_any_held+0x75/0xa0 [ 1385.048163] ? vfs_write+0x354/0xa70 [ 1385.048737] ? fput_many+0x2f/0x1a0 [ 1385.049307] ? ksys_write+0x1a9/0x260 [ 1385.049896] ? __ia32_sys_read+0xb0/0xb0 [ 1385.050523] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1385.051319] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1385.052106] ? trace_hardirqs_on+0x5b/0x180 [ 1385.052782] do_syscall_64+0x33/0x40 [ 1385.053368] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1385.054145] RIP: 0033:0x7f33add2bb19 [ 1385.054726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1385.057504] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1385.058673] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1385.059754] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1385.060828] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1385.061907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1385.063000] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:25:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:25:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:25:40 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(0x0, &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:25:40 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, 0x0, 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:25:40 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) r2 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x10, 0x1, 0x0, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000300)=0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x6003, @fd_index=0x8, 0xa075, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}, 0x1) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, r5, &(0x7f0000000240)={0x2000}, &(0x7f0000000280)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r6}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r7, r4, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x1, 0x0, 0x1, {0x0, r6}}, 0x81) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x300) 05:25:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000040)=0x40, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000340)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x40, 0x5200}, 0x40) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast2, 0xd08}, 0x1c) r2 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000001c0)={'veth1_macvtap\x00'}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(r4, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) syz_io_uring_setup(0x5af6, &(0x7f0000000380)={0x0, 0x942a, 0x20, 0x0, 0x87, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fed000/0x10000)=nil, &(0x7f0000000400), &(0x7f0000000440)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 05:25:40 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 43) 05:25:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1400.340532] FAULT_INJECTION: forcing a failure. [ 1400.340532] name failslab, interval 1, probability 0, space 0, times 0 [ 1400.341988] CPU: 0 PID: 9966 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1400.342764] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1400.343717] Call Trace: [ 1400.344031] dump_stack+0x107/0x167 [ 1400.344466] should_fail.cold+0x5/0xa [ 1400.344917] should_failslab+0x5/0x20 [ 1400.345365] __kmalloc_track_caller+0x79/0x370 [ 1400.345889] ? kstrdup_const+0x53/0x80 [ 1400.346343] kstrdup+0x36/0x70 [ 1400.346717] kstrdup_const+0x53/0x80 [ 1400.347149] alloc_vfsmnt+0xb5/0x680 [ 1400.347585] clone_mnt+0x6c/0xce0 [ 1400.347994] ? is_subdir+0x1a8/0x320 [ 1400.348429] copy_tree+0x3b0/0xa60 [ 1400.348854] copy_mnt_ns+0x144/0xa00 [ 1400.349299] ? kmem_cache_alloc+0x2a6/0x310 [ 1400.349801] create_new_namespaces+0xd6/0xb20 [ 1400.350320] copy_namespaces+0x3fb/0x4f0 [ 1400.350794] copy_process+0x385b/0x7800 [ 1400.351253] ? __lockdep_reset_lock+0x180/0x180 [ 1400.351780] ? mark_lock+0xf5/0x2df0 [ 1400.352214] ? lock_acquire+0x197/0x470 [ 1400.352685] ? __cleanup_sighand+0xb0/0xb0 [ 1400.353195] ? _copy_from_user+0xfb/0x1b0 [ 1400.353681] kernel_clone+0xe7/0x980 [ 1400.354108] ? __lockdep_reset_lock+0x180/0x180 [ 1400.354640] ? create_io_thread+0xf0/0xf0 [ 1400.355132] ? ksys_write+0x21a/0x260 [ 1400.355568] ? lock_downgrade+0x6d0/0x6d0 [ 1400.356049] __do_sys_clone3+0x1e5/0x320 [ 1400.356516] ? __do_sys_clone+0x110/0x110 [ 1400.357010] ? rcu_read_lock_any_held+0x75/0xa0 [ 1400.357567] ? vfs_write+0x354/0xa70 [ 1400.358004] ? fput_many+0x2f/0x1a0 [ 1400.358437] ? ksys_write+0x1a9/0x260 [ 1400.358878] ? __ia32_sys_read+0xb0/0xb0 [ 1400.359359] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1400.359957] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1400.360541] ? trace_hardirqs_on+0x5b/0x180 [ 1400.361040] do_syscall_64+0x33/0x40 [ 1400.361476] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1400.362056] RIP: 0033:0x7f33add2bb19 [ 1400.362484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1400.364548] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1400.365423] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1400.366226] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1400.367029] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1400.367834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1400.368638] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:25:40 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 44) [ 1400.600404] FAULT_INJECTION: forcing a failure. [ 1400.600404] name failslab, interval 1, probability 0, space 0, times 0 [ 1400.602320] CPU: 0 PID: 9981 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1400.603116] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1400.604096] Call Trace: [ 1400.604418] dump_stack+0x107/0x167 [ 1400.604844] should_fail.cold+0x5/0xa [ 1400.605294] ? create_object.isra.0+0x3a/0xa20 [ 1400.605823] should_failslab+0x5/0x20 [ 1400.606273] kmem_cache_alloc+0x5b/0x310 [ 1400.606747] create_object.isra.0+0x3a/0xa20 [ 1400.607265] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1400.607851] __kmalloc_track_caller+0x177/0x370 [ 1400.608400] ? kstrdup_const+0x53/0x80 [ 1400.608852] kstrdup+0x36/0x70 [ 1400.609231] kstrdup_const+0x53/0x80 [ 1400.609656] alloc_vfsmnt+0xb5/0x680 [ 1400.610086] clone_mnt+0x6c/0xce0 [ 1400.610495] ? is_subdir+0x1a8/0x320 [ 1400.610927] copy_tree+0x3b0/0xa60 [ 1400.611360] copy_mnt_ns+0x144/0xa00 [ 1400.611788] ? kmem_cache_alloc+0x2a6/0x310 [ 1400.612293] create_new_namespaces+0xd6/0xb20 [ 1400.612826] copy_namespaces+0x3fb/0x4f0 [ 1400.613307] copy_process+0x385b/0x7800 [ 1400.613771] ? __lockdep_reset_lock+0x180/0x180 [ 1400.614315] ? mark_lock+0xf5/0x2df0 [ 1400.614754] ? lock_acquire+0x197/0x470 [ 1400.615224] ? __cleanup_sighand+0xb0/0xb0 [ 1400.615719] ? _copy_from_user+0xfb/0x1b0 [ 1400.616200] kernel_clone+0xe7/0x980 [ 1400.616624] ? __lockdep_reset_lock+0x180/0x180 [ 1400.617170] ? create_io_thread+0xf0/0xf0 [ 1400.617664] ? ksys_write+0x21a/0x260 [ 1400.618101] ? lock_downgrade+0x6d0/0x6d0 [ 1400.618586] __do_sys_clone3+0x1e5/0x320 [ 1400.619050] ? __do_sys_clone+0x110/0x110 [ 1400.619542] ? rcu_read_lock_any_held+0x75/0xa0 [ 1400.620080] ? vfs_write+0x354/0xa70 [ 1400.620522] ? fput_many+0x2f/0x1a0 [ 1400.620951] ? ksys_write+0x1a9/0x260 [ 1400.621414] ? __ia32_sys_read+0xb0/0xb0 [ 1400.621883] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1400.622490] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1400.623079] ? trace_hardirqs_on+0x5b/0x180 [ 1400.623582] do_syscall_64+0x33/0x40 [ 1400.624005] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1400.624585] RIP: 0033:0x7f33add2bb19 [ 1400.625013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1400.627077] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1400.627959] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1400.628779] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1400.629600] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1400.630415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1400.631219] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 [ 1400.876880] perf: interrupt took too long (12426 > 12410), lowering kernel.perf_event_max_sample_rate to 16000 05:25:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:25:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000040)=0x40, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000340)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x40, 0x5200}, 0x40) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast2, 0xd08}, 0x1c) r2 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000001c0)={'veth1_macvtap\x00'}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(r4, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) syz_io_uring_setup(0x5af6, &(0x7f0000000380)={0x0, 0x942a, 0x20, 0x0, 0x87, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fed000/0x10000)=nil, &(0x7f0000000400), &(0x7f0000000440)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 05:25:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:25:59 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 45) 05:25:59 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(0x0, &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:25:59 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, 0x0, 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:25:59 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:25:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1419.127703] FAULT_INJECTION: forcing a failure. [ 1419.127703] name failslab, interval 1, probability 0, space 0, times 0 [ 1419.130345] CPU: 0 PID: 9994 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1419.131574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1419.133040] Call Trace: [ 1419.133532] dump_stack+0x107/0x167 [ 1419.134194] should_fail.cold+0x5/0xa [ 1419.134879] ? create_object.isra.0+0x3a/0xa20 [ 1419.135695] should_failslab+0x5/0x20 [ 1419.136376] kmem_cache_alloc+0x5b/0x310 [ 1419.137110] create_object.isra.0+0x3a/0xa20 [ 1419.137914] kmemleak_alloc_percpu+0xa0/0x100 [ 1419.138705] pcpu_alloc+0x4e2/0x1240 [ 1419.139400] alloc_vfsmnt+0xfd/0x680 [ 1419.140049] clone_mnt+0x6c/0xce0 [ 1419.140671] ? is_subdir+0x1a8/0x320 [ 1419.141332] copy_tree+0x3b0/0xa60 [ 1419.141994] copy_mnt_ns+0x144/0xa00 [ 1419.142633] ? kmem_cache_alloc+0x2a6/0x310 [ 1419.143409] create_new_namespaces+0xd6/0xb20 [ 1419.144181] copy_namespaces+0x3fb/0x4f0 [ 1419.144906] copy_process+0x385b/0x7800 [ 1419.145622] ? __lockdep_reset_lock+0x180/0x180 [ 1419.146439] ? mark_lock+0xf5/0x2df0 [ 1419.147109] ? lock_acquire+0x197/0x470 [ 1419.147838] ? __cleanup_sighand+0xb0/0xb0 [ 1419.148608] ? _copy_from_user+0xfb/0x1b0 [ 1419.149364] kernel_clone+0xe7/0x980 [ 1419.150028] ? __lockdep_reset_lock+0x180/0x180 [ 1419.150852] ? create_io_thread+0xf0/0xf0 [ 1419.151605] ? ksys_write+0x21a/0x260 [ 1419.152279] ? lock_downgrade+0x6d0/0x6d0 [ 1419.152996] __do_sys_clone3+0x1e5/0x320 [ 1419.153724] ? __do_sys_clone+0x110/0x110 [ 1419.154487] ? rcu_read_lock_any_held+0x75/0xa0 [ 1419.155306] ? vfs_write+0x354/0xa70 [ 1419.155970] ? fput_many+0x2f/0x1a0 [ 1419.156617] ? ksys_write+0x1a9/0x260 [ 1419.157293] ? __ia32_sys_read+0xb0/0xb0 [ 1419.158001] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1419.158925] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1419.159830] ? trace_hardirqs_on+0x5b/0x180 [ 1419.160600] do_syscall_64+0x33/0x40 [ 1419.161263] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1419.162172] RIP: 0033:0x7f33add2bb19 [ 1419.162833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1419.166064] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1419.167403] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1419.168648] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1419.169907] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1419.171158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1419.172401] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:25:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000040)=0x40, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000340)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x40, 0x5200}, 0x40) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast2, 0xd08}, 0x1c) r2 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000001c0)={'veth1_macvtap\x00'}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(r4, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) syz_io_uring_setup(0x5af6, &(0x7f0000000380)={0x0, 0x942a, 0x20, 0x0, 0x87, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fed000/0x10000)=nil, &(0x7f0000000400), &(0x7f0000000440)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) [ 1419.255644] audit: type=1326 audit(1707888359.751:156): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9992 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fc9539e1b19 code=0x0 05:25:59 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x2272, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400000, 0x184) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000080)=0xfffffc00, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x1) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x40000000000012c, 0x4000850) 05:26:00 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) readv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x1) dup2(r2, r1) readv(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r3, 0x2285, 0x0) clock_gettime(0x4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)=ANY=[@ANYBLOB="ebfffffffe0045000021000042871d2132577c58377ebe4c2a543ac5902edece0a9965461e17bfab26b353600419c8da1115e42bdc445c46b96889cadc7f3d4429c54c525856", @ANYRES32=r0, @ANYBLOB="1c71164b50397294736fa88d8f67003000c8"]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) unshare(0x28020600) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x6c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x814}, 0x20000801) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r4, 0xffffffffffffffff, 0x0, 0xb052) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) unshare(0x0) 05:26:00 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, 0x0, 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:26:00 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(0x0, &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:26:00 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 46) [ 1419.820558] FAULT_INJECTION: forcing a failure. [ 1419.820558] name failslab, interval 1, probability 0, space 0, times 0 [ 1419.822289] CPU: 0 PID: 10025 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1419.823086] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1419.824047] Call Trace: [ 1419.824364] dump_stack+0x107/0x167 [ 1419.824793] should_fail.cold+0x5/0xa [ 1419.825240] ? create_object.isra.0+0x3a/0xa20 [ 1419.825784] should_failslab+0x5/0x20 [ 1419.826228] kmem_cache_alloc+0x5b/0x310 [ 1419.826710] ? mark_held_locks+0x9e/0xe0 [ 1419.827187] create_object.isra.0+0x3a/0xa20 [ 1419.827714] kmemleak_alloc_percpu+0xa0/0x100 [ 1419.828246] pcpu_alloc+0x4e2/0x1240 [ 1419.828702] alloc_vfsmnt+0xfd/0x680 [ 1419.829145] clone_mnt+0x6c/0xce0 [ 1419.829561] ? is_subdir+0x1a8/0x320 [ 1419.830001] copy_tree+0x3b0/0xa60 [ 1419.830439] copy_mnt_ns+0x144/0xa00 [ 1419.830879] ? kmem_cache_alloc+0x2a6/0x310 [ 1419.831392] create_new_namespaces+0xd6/0xb20 [ 1419.831913] copy_namespaces+0x3fb/0x4f0 [ 1419.832383] copy_process+0x385b/0x7800 [ 1419.832847] ? __lockdep_reset_lock+0x180/0x180 [ 1419.833391] ? mark_lock+0xf5/0x2df0 [ 1419.833830] ? lock_acquire+0x197/0x470 [ 1419.834306] ? __cleanup_sighand+0xb0/0xb0 [ 1419.834817] ? _copy_from_user+0xfb/0x1b0 [ 1419.835306] kernel_clone+0xe7/0x980 [ 1419.835744] ? __lockdep_reset_lock+0x180/0x180 [ 1419.836280] ? create_io_thread+0xf0/0xf0 [ 1419.836776] ? ksys_write+0x21a/0x260 [ 1419.837227] ? lock_downgrade+0x6d0/0x6d0 [ 1419.837728] __do_sys_clone3+0x1e5/0x320 [ 1419.838199] ? __do_sys_clone+0x110/0x110 [ 1419.838699] ? rcu_read_lock_any_held+0x75/0xa0 [ 1419.839240] ? vfs_write+0x354/0xa70 [ 1419.839673] ? fput_many+0x2f/0x1a0 [ 1419.840095] ? ksys_write+0x1a9/0x260 [ 1419.840537] ? __ia32_sys_read+0xb0/0xb0 [ 1419.841007] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1419.841615] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1419.842327] ? trace_hardirqs_on+0x5b/0x180 [ 1419.842874] do_syscall_64+0x33/0x40 [ 1419.843347] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1419.843935] RIP: 0033:0x7f33add2bb19 [ 1419.844366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1419.846442] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1419.847293] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1419.848096] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1419.848900] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1419.849715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1419.850526] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:26:00 executing program 7: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(0x0, &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:26:00 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) readv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x1) dup2(r2, r1) readv(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r3, 0x2285, 0x0) clock_gettime(0x4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)=ANY=[@ANYBLOB="ebfffffffe0045000021000042871d2132577c58377ebe4c2a543ac5902edece0a9965461e17bfab26b353600419c8da1115e42bdc445c46b96889cadc7f3d4429c54c525856", @ANYRES32=r0, @ANYBLOB="1c71164b50397294736fa88d8f67003000c8"]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) unshare(0x28020600) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x6c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x814}, 0x20000801) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r4, 0xffffffffffffffff, 0x0, 0xb052) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) unshare(0x0) 05:26:00 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:26:17 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:26:17 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:26:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0xaf2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futimesat(r1, &(0x7f0000000080)='./file1\x00', &(0x7f0000000200)={{0x0, 0xea60}, {r2, r3/1000+10000}}) r4 = signalfd(r1, &(0x7f0000000240)={[0x2]}, 0x8) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000280)={0x81, 0x40000000, 0x8000, 0x6112, 0xb0889b8}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4) stat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000140)) ftruncate(r1, 0xd4) 05:26:17 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 47) 05:26:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:26:17 executing program 7: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) readv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x1) dup2(r2, r1) readv(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r3, 0x2285, 0x0) clock_gettime(0x4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)=ANY=[@ANYBLOB="ebfffffffe0045000021000042871d2132577c58377ebe4c2a543ac5902edece0a9965461e17bfab26b353600419c8da1115e42bdc445c46b96889cadc7f3d4429c54c525856", @ANYRES32=r0, @ANYBLOB="1c71164b50397294736fa88d8f67003000c8"]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) unshare(0x28020600) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x6c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x814}, 0x20000801) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r4, 0xffffffffffffffff, 0x0, 0xb052) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) unshare(0x0) 05:26:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:26:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1437.166011] audit: type=1326 audit(1707888377.661:157): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10051 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fc9539e1b19 code=0x0 [ 1437.195684] FAULT_INJECTION: forcing a failure. [ 1437.195684] name failslab, interval 1, probability 0, space 0, times 0 [ 1437.197874] CPU: 0 PID: 10053 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1437.199004] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1437.200365] Call Trace: [ 1437.200820] dump_stack+0x107/0x167 [ 1437.201436] should_fail.cold+0x5/0xa [ 1437.202079] ? alloc_vfsmnt+0x23/0x680 [ 1437.202721] should_failslab+0x5/0x20 [ 1437.203361] kmem_cache_alloc+0x5b/0x310 [ 1437.204146] ? copy_tree+0x61a/0xa60 [ 1437.204819] alloc_vfsmnt+0x23/0x680 [ 1437.205513] clone_mnt+0x6c/0xce0 [ 1437.206105] copy_tree+0x3b0/0xa60 [ 1437.206714] copy_mnt_ns+0x144/0xa00 [ 1437.207319] ? kmem_cache_alloc+0x2a6/0x310 [ 1437.208050] create_new_namespaces+0xd6/0xb20 [ 1437.208781] copy_namespaces+0x3fb/0x4f0 [ 1437.209474] copy_process+0x385b/0x7800 [ 1437.210132] ? __lockdep_reset_lock+0x180/0x180 [ 1437.210887] ? mark_lock+0xf5/0x2df0 [ 1437.211501] ? lock_acquire+0x197/0x470 [ 1437.212183] ? __cleanup_sighand+0xb0/0xb0 [ 1437.212895] ? _copy_from_user+0xfb/0x1b0 [ 1437.213598] kernel_clone+0xe7/0x980 [ 1437.214192] ? __lockdep_reset_lock+0x180/0x180 [ 1437.214958] ? create_io_thread+0xf0/0xf0 [ 1437.215647] ? ksys_write+0x21a/0x260 [ 1437.216259] ? lock_downgrade+0x6d0/0x6d0 [ 1437.216930] __do_sys_clone3+0x1e5/0x320 [ 1437.217590] ? __do_sys_clone+0x110/0x110 [ 1437.218304] ? rcu_read_lock_any_held+0x75/0xa0 [ 1437.219049] ? vfs_write+0x354/0xa70 [ 1437.219653] ? fput_many+0x2f/0x1a0 [ 1437.220248] ? ksys_write+0x1a9/0x260 [ 1437.220860] ? __ia32_sys_read+0xb0/0xb0 [ 1437.221531] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1437.222364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1437.223172] ? trace_hardirqs_on+0x5b/0x180 [ 1437.223870] do_syscall_64+0x33/0x40 [ 1437.224480] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1437.225288] RIP: 0033:0x7f33add2bb19 [ 1437.225892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1437.228796] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1437.230010] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1437.231141] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1437.232295] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1437.233419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1437.234569] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:26:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000000340)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701be", 0x27, 0xb800}], 0x0, &(0x7f0000011700)=ANY=[]) openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x84000, 0x2, 0x8}, 0x18) 05:26:17 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 48) 05:26:18 executing program 7: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x50, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r4, r5, &(0x7f0000000280)=@IORING_OP_FSYNC={0x3, 0x3, 0x0, @fd_index=0x7, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x730c29e3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000440)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_io_uring_setup(0x3a75, &(0x7f0000000500)={0x0, 0x1cb2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), 0x0) inotify_init1(0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) r6 = fork() r7 = syz_open_procfs(r6, &(0x7f0000000300)='map_files\x00') sendmsg$AUDIT_MAKE_EQUIV(r7, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="28000000f703100029bd7000ffdbdf2507ffac00070000002e2f66696c65302e2f66496c65300000"], 0x28}, 0x1, 0x0, 0x0, 0x4801}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 05:26:18 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:26:18 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1437.693303] FAULT_INJECTION: forcing a failure. [ 1437.693303] name failslab, interval 1, probability 0, space 0, times 0 [ 1437.695850] CPU: 0 PID: 10074 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1437.697024] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1437.698425] Call Trace: [ 1437.698881] dump_stack+0x107/0x167 [ 1437.699506] should_fail.cold+0x5/0xa [ 1437.700154] ? alloc_vfsmnt+0x23/0x680 [ 1437.700811] ? alloc_vfsmnt+0x23/0x680 [ 1437.701474] should_failslab+0x5/0x20 [ 1437.702122] kmem_cache_alloc+0x5b/0x310 [ 1437.702809] ? copy_tree+0x61a/0xa60 [ 1437.703447] alloc_vfsmnt+0x23/0x680 [ 1437.704082] clone_mnt+0x6c/0xce0 [ 1437.704681] copy_tree+0x3b0/0xa60 [ 1437.705304] copy_mnt_ns+0x144/0xa00 [ 1437.705942] ? kmem_cache_alloc+0x2a6/0x310 [ 1437.706683] create_new_namespaces+0xd6/0xb20 [ 1437.707452] copy_namespaces+0x3fb/0x4f0 [ 1437.708145] copy_process+0x385b/0x7800 [ 1437.708819] ? __lockdep_reset_lock+0x180/0x180 [ 1437.709605] ? mark_lock+0xf5/0x2df0 [ 1437.710244] ? lock_acquire+0x197/0x470 [ 1437.710937] ? __cleanup_sighand+0xb0/0xb0 [ 1437.711667] ? _copy_from_user+0xfb/0x1b0 [ 1437.712373] kernel_clone+0xe7/0x980 [ 1437.712997] ? __lockdep_reset_lock+0x180/0x180 [ 1437.713791] ? create_io_thread+0xf0/0xf0 [ 1437.714511] ? ksys_write+0x21a/0x260 [ 1437.715158] ? lock_downgrade+0x6d0/0x6d0 [ 1437.715857] __do_sys_clone3+0x1e5/0x320 [ 1437.716537] ? __do_sys_clone+0x110/0x110 [ 1437.717257] ? rcu_read_lock_any_held+0x75/0xa0 [ 1437.718039] ? vfs_write+0x354/0xa70 [ 1437.718669] ? fput_many+0x2f/0x1a0 [ 1437.719281] ? ksys_write+0x1a9/0x260 [ 1437.719924] ? __ia32_sys_read+0xb0/0xb0 [ 1437.720611] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1437.721483] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1437.722340] ? trace_hardirqs_on+0x5b/0x180 [ 1437.723064] do_syscall_64+0x33/0x40 [ 1437.723680] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1437.724524] RIP: 0033:0x7f33add2bb19 [ 1437.725141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1437.728160] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1437.729386] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1437.730525] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1437.731656] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1437.732776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1437.733903] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:26:18 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) utimensat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={{0x0, 0x2710}, {0x77359400}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x22080, 0x8b) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000340)={{0xb87, 0xaf2}, 0x100, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', &(0x7f00000001c0)={0x80200, 0x0, 0x22}, 0x18) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file1\x00') [ 1437.799149] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 05:26:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="090000002500210c00000000000200001b1f258dd2eb00000000680086efe51a86c1f2d6628a0b62d987e183bbeed2037c563f6a01b3cccaf421029b7d9148e97f3293eaa2eb79081f38703dde26746f4d76a3d1", @ANYRES32], 0x2c}}, 0x0) 05:26:18 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000480)=@abs={0x1}, 0x6e) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x80, 0x0) preadv(r1, 0x0, 0x0, 0x401, 0x0) listen(r0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) connect$unix(r2, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x1d) write$P9_RREADLINK(r1, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=0x0, @ANYBLOB=',dfltgid=', @ANYRESHEX, @ANYBLOB="6c6f6f73652c76657273696f6e3d3970323030302e752c64666c746769643da43b65785a38893dbe75697bf8a80efac11fba43dec3229fea067d6f", @ANYRESHEX=0x0, @ANYBLOB=',version=9p2000,fowner=', @ANYRESDEC, @ANYRESOCT]) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee01, @ANYBLOB="040000000000000008000300", @ANYRES32=0xee00, @ANYBLOB="080007f9", @ANYRES32=0x0, @ANYBLOB="12ee03000000010000000000200100"], 0x44, 0x1) fcntl$dupfd(r1, 0x0, r4) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340), 0x8000) 05:26:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getpgid(0x0) r0 = epoll_create(0x1) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/xfrm_stat\x00') ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r4, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r3, r1, 0x7, r0, &(0x7f0000000040)={r0, r4}) 05:26:18 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 49) [ 1438.148798] FAULT_INJECTION: forcing a failure. [ 1438.148798] name failslab, interval 1, probability 0, space 0, times 0 [ 1438.150937] CPU: 1 PID: 10102 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1438.152157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1438.153611] Call Trace: [ 1438.154089] dump_stack+0x107/0x167 [ 1438.154738] should_fail.cold+0x5/0xa [ 1438.155427] should_failslab+0x5/0x20 [ 1438.156083] __kmalloc_track_caller+0x79/0x370 [ 1438.156874] ? kstrdup_const+0x53/0x80 [ 1438.157594] kstrdup+0x36/0x70 [ 1438.158160] kstrdup_const+0x53/0x80 [ 1438.158822] alloc_vfsmnt+0xb5/0x680 [ 1438.159479] clone_mnt+0x6c/0xce0 [ 1438.160109] copy_tree+0x3b0/0xa60 [ 1438.160766] copy_mnt_ns+0x144/0xa00 [ 1438.161421] ? kmem_cache_alloc+0x2a6/0x310 [ 1438.162215] create_new_namespaces+0xd6/0xb20 [ 1438.163013] copy_namespaces+0x3fb/0x4f0 [ 1438.163731] copy_process+0x385b/0x7800 [ 1438.164432] ? __lockdep_reset_lock+0x180/0x180 [ 1438.165073] ? mark_lock+0xf5/0x2df0 [ 1438.165741] ? lock_acquire+0x197/0x470 [ 1438.166468] ? __cleanup_sighand+0xb0/0xb0 [ 1438.167229] ? _copy_from_user+0xfb/0x1b0 [ 1438.167957] kernel_clone+0xe7/0x980 [ 1438.168602] ? __lockdep_reset_lock+0x180/0x180 [ 1438.169397] ? create_io_thread+0xf0/0xf0 [ 1438.170142] ? ksys_write+0x21a/0x260 [ 1438.170803] ? lock_downgrade+0x6d0/0x6d0 [ 1438.171533] __do_sys_clone3+0x1e5/0x320 [ 1438.172096] ? __do_sys_clone+0x110/0x110 [ 1438.172838] ? rcu_read_lock_any_held+0x75/0xa0 [ 1438.173638] ? vfs_write+0x354/0xa70 [ 1438.174292] ? fput_many+0x2f/0x1a0 [ 1438.174928] ? ksys_write+0x1a9/0x260 [ 1438.175592] ? __ia32_sys_read+0xb0/0xb0 [ 1438.176297] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1438.177208] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1438.178116] ? trace_hardirqs_on+0x5b/0x180 [ 1438.178769] do_syscall_64+0x33/0x40 [ 1438.179418] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1438.180296] RIP: 0033:0x7f33add2bb19 [ 1438.180943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1438.184058] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1438.185352] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1438.186560] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1438.187773] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1438.188971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1438.190175] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:26:18 executing program 7: syz_mount_image$iso9660(&(0x7f0000003400), &(0x7f0000003440)='./file0\x00', 0x0, 0x0, &(0x7f0000003900), 0x0, &(0x7f00000039c0)=ANY=[@ANYBLOB='sbsector=0x0000000000000000,dmode=0x0000000000000000,uid=', @ANYRESDEC, @ANYBLOB="0010"]) [ 1453.068856] audit: type=1326 audit(1707888393.564:158): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10111 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fc9539e1b19 code=0x0 05:26:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:26:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:26:33 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:26:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[@ANYRES16], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:26:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffdffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x6, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r0 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x0) fallocate(r0, 0x0, 0x0, 0x400004) 05:26:33 executing program 7: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400ece9b259edcfd9152c3223000026000100"/31], 0x14}}, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x24, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5}, 0x443c) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open_tree(r0, &(0x7f0000000000)='./file0\x00', 0x88001) io_uring_enter(r3, 0x5885, 0x7de3, 0x1, &(0x7f0000000180)={[0x9]}, 0x8) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0)=0x10, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r0) 05:26:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:26:33 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 50) [ 1453.102942] FAULT_INJECTION: forcing a failure. [ 1453.102942] name failslab, interval 1, probability 0, space 0, times 0 [ 1453.105067] CPU: 0 PID: 10126 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1453.106173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1453.107485] Call Trace: [ 1453.107923] dump_stack+0x107/0x167 [ 1453.108523] should_fail.cold+0x5/0xa [ 1453.109146] ? create_object.isra.0+0x3a/0xa20 [ 1453.109905] should_failslab+0x5/0x20 [ 1453.110522] kmem_cache_alloc+0x5b/0x310 [ 1453.111193] create_object.isra.0+0x3a/0xa20 [ 1453.111899] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1453.112725] __kmalloc_track_caller+0x177/0x370 [ 1453.113510] ? kstrdup_const+0x53/0x80 [ 1453.114151] kstrdup+0x36/0x70 [ 1453.114695] kstrdup_const+0x53/0x80 [ 1453.115294] alloc_vfsmnt+0xb5/0x680 [ 1453.115898] clone_mnt+0x6c/0xce0 [ 1453.116472] copy_tree+0x3b0/0xa60 [ 1453.117062] copy_mnt_ns+0x144/0xa00 [ 1453.117668] ? kmem_cache_alloc+0x2a6/0x310 [ 1453.118407] create_new_namespaces+0xd6/0xb20 [ 1453.119135] copy_namespaces+0x3fb/0x4f0 [ 1453.119798] copy_process+0x385b/0x7800 [ 1453.120444] ? __lockdep_reset_lock+0x180/0x180 [ 1453.121227] ? mark_lock+0xf5/0x2df0 [ 1453.121846] ? lock_acquire+0x197/0x470 [ 1453.122535] ? __cleanup_sighand+0xb0/0xb0 [ 1453.123231] ? _copy_from_user+0xfb/0x1b0 [ 1453.123902] kernel_clone+0xe7/0x980 [ 1453.124501] ? __lockdep_reset_lock+0x180/0x180 [ 1453.125238] ? create_io_thread+0xf0/0xf0 [ 1453.125921] ? ksys_write+0x21a/0x260 [ 1453.126526] ? lock_downgrade+0x6d0/0x6d0 [ 1453.127188] __do_sys_clone3+0x1e5/0x320 [ 1453.127829] ? __do_sys_clone+0x110/0x110 [ 1453.128519] ? rcu_read_lock_any_held+0x75/0xa0 [ 1453.129288] ? vfs_write+0x354/0xa70 [ 1453.129895] ? fput_many+0x2f/0x1a0 [ 1453.130503] ? ksys_write+0x1a9/0x260 [ 1453.131107] ? __ia32_sys_read+0xb0/0xb0 [ 1453.131788] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1453.132623] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1453.133472] ? trace_hardirqs_on+0x5b/0x180 [ 1453.134180] do_syscall_64+0x33/0x40 [ 1453.134773] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1453.135580] RIP: 0033:0x7f33add2bb19 [ 1453.136199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1453.139085] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1453.140339] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1453.141447] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1453.142637] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1453.143798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1453.144962] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:26:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffdffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x6, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r0 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x0) fallocate(r0, 0x0, 0x0, 0x400004) 05:26:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) syz_io_uring_setup(0x457f, &(0x7f00000000c0)={0x0, 0x58c9, 0x2, 0x3, 0x8b}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000180)=0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r3 = inotify_init1(0x0) r4 = inotify_add_watch(r3, &(0x7f0000000040)='.\x00', 0x2000003) inotify_add_watch(r3, 0x0, 0x4000040) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_rm_watch(r3, r4) ioctl$BTRFS_IOC_BALANCE_CTL(r3, 0x40049421, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000200)="1eecd93735c44fb403292adf1183b1b37359fc5d952f72f57313fc71da00043824a7a91b66e3c15e690475706eacaa2a11516f6bdae1719641e9ca9ac07109a1c771750aea11c86edd4a2fe38badde5b051700e793ededbbc3e9658668347430b90c87a15deeaa274587570734535ff56936598d90b1bb184947987611e123040b62e1b5021d19c2e5c200"/150, 0x96, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000000)=""/30, 0x1e) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000000480)=ANY=[@ANYBLOB="0928007f0b78bd7accb9c087e640d5dc5782ff397ae5aacd85ab", @ANYRES32, @ANYBLOB="4f9ce80776ac95fd2e2f66696c5d3800c73f316aa7dd589f4837f363ebda04439c94c54ced9b119ed9b88f78d7284f71e75788cb009193a0e5657489644de514342b483d6f062a35a4f2e8188d0c1f0b4f1aae23db9a599b1b84a425e9fae211d695a01d9530436f6b37242c6cefa90d0e3e737079283f09f869d0f0bc7026aa086e4df80e0ac2f66038335479c81f51380860b46f1814cddf8c07c0f7ce3c0ab18de46c69ac68a995332cef0aa0b26e7a9dadce0305effea983547f26162a4c5ce808f7037fbae1f97cf070e168c280a7184597d6eb660e13"]) dup3(r5, r3, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, r5, 0x8000000) syz_io_uring_submit(0x0, r1, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd=r0, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r2}}, 0x7) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) 05:26:33 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, 0x0, 0x0, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:26:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[@ANYRES16], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:26:34 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 51) [ 1453.861641] FAULT_INJECTION: forcing a failure. [ 1453.861641] name failslab, interval 1, probability 0, space 0, times 0 [ 1453.863644] CPU: 0 PID: 10150 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1453.864790] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1453.866158] Call Trace: [ 1453.866595] dump_stack+0x107/0x167 [ 1453.867201] should_fail.cold+0x5/0xa [ 1453.867831] ? create_object.isra.0+0x3a/0xa20 [ 1453.868580] should_failslab+0x5/0x20 [ 1453.869207] kmem_cache_alloc+0x5b/0x310 [ 1453.869885] create_object.isra.0+0x3a/0xa20 [ 1453.870616] kmemleak_alloc_percpu+0xa0/0x100 [ 1453.871355] pcpu_alloc+0x4e2/0x1240 [ 1453.871992] alloc_vfsmnt+0xfd/0x680 [ 1453.872618] clone_mnt+0x6c/0xce0 [ 1453.873206] copy_tree+0x3b0/0xa60 [ 1453.873829] copy_mnt_ns+0x144/0xa00 [ 1453.874458] ? kmem_cache_alloc+0x2a6/0x310 [ 1453.875172] create_new_namespaces+0xd6/0xb20 [ 1453.875915] copy_namespaces+0x3fb/0x4f0 [ 1453.876586] copy_process+0x385b/0x7800 [ 1453.877244] ? __lockdep_reset_lock+0x180/0x180 [ 1453.878017] ? mark_lock+0xf5/0x2df0 [ 1453.878644] ? lock_acquire+0x197/0x470 [ 1453.879330] ? __cleanup_sighand+0xb0/0xb0 [ 1453.880052] ? _copy_from_user+0xfb/0x1b0 [ 1453.880755] kernel_clone+0xe7/0x980 [ 1453.881378] ? __lockdep_reset_lock+0x180/0x180 [ 1453.882154] ? create_io_thread+0xf0/0xf0 [ 1453.882854] ? ksys_write+0x21a/0x260 [ 1453.883478] ? lock_downgrade+0x6d0/0x6d0 [ 1453.884154] __do_sys_clone3+0x1e5/0x320 [ 1453.884825] ? __do_sys_clone+0x110/0x110 [ 1453.885538] ? rcu_read_lock_any_held+0x75/0xa0 [ 1453.886306] ? vfs_write+0x354/0xa70 [ 1453.886912] ? fput_many+0x2f/0x1a0 [ 1453.887518] ? ksys_write+0x1a9/0x260 [ 1453.888142] ? __ia32_sys_read+0xb0/0xb0 [ 1453.888807] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1453.889656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1453.890503] ? trace_hardirqs_on+0x5b/0x180 [ 1453.891198] do_syscall_64+0x33/0x40 [ 1453.891805] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1453.892633] RIP: 0033:0x7f33add2bb19 [ 1453.893246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1453.896238] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1453.897466] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1453.898625] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1453.899780] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1453.900949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1453.902131] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:26:34 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x8, 0x5a, 0x7f, 0x4}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:26:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:26:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:26:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:26:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x40) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = open_tree(r0, &(0x7f0000000100)='./file0\x00', 0x9000) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000325bd7000fbdbdf250b000000100005800c0002800800040007000000b94062d90252ab2064d48c3aa2de47cbc0829d39b3d346f99eaf867df4cc9f89995b2cb1ec48"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) splice(r1, &(0x7f0000000280)=0x800, r2, &(0x7f0000000080)=0x100000001, 0x8, 0x2) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) lseek(r4, 0x0, 0x4) 05:26:49 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 52) 05:26:49 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[@ANYRES16], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(r2, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:26:49 executing program 7: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1, 0x8}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000000c0)=0x80) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000340)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r0, 0x2, 0x9, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x4}, @NL80211_ATTR_MAC={0x1, 0x6, @from_mac}, @NL80211_ATTR_MAC={0xa, 0x6, @random="0bbb800f5e17"}]}, 0x40}, 0x1, 0x0, 0x0, 0x5}, 0x20044094) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000900)) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x43, &(0x7f0000000680)={&(0x7f0000000480)={0x2c, r6, 0x2, 0x0, 0x0, {{0x6}, {@val={0x0, 0x1, 0x47}, @val, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r6, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {@void, @val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040000}, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000140)={0x2c, 0x0, 0x201, 0x0, 0x0, {{0x6}, {@void, @val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3f}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xc1}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xfc}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x66}]}, 0x54}, 0x1, 0x0, 0x0, 0x48080}, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:26:49 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, 0x0, 0x0, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1469.404328] FAULT_INJECTION: forcing a failure. [ 1469.404328] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.406324] CPU: 1 PID: 10176 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1469.407408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1469.408697] Call Trace: [ 1469.409122] dump_stack+0x107/0x167 [ 1469.409709] should_fail.cold+0x5/0xa [ 1469.410321] ? create_object.isra.0+0x3a/0xa20 [ 1469.411047] should_failslab+0x5/0x20 [ 1469.411647] kmem_cache_alloc+0x5b/0x310 [ 1469.412278] ? mark_held_locks+0x9e/0xe0 [ 1469.412922] create_object.isra.0+0x3a/0xa20 [ 1469.413611] kmemleak_alloc_percpu+0xa0/0x100 [ 1469.414326] pcpu_alloc+0x4e2/0x1240 [ 1469.414933] alloc_vfsmnt+0xfd/0x680 [ 1469.415525] clone_mnt+0x6c/0xce0 [ 1469.416080] copy_tree+0x3b0/0xa60 [ 1469.416660] copy_mnt_ns+0x144/0xa00 [ 1469.417238] ? kmem_cache_alloc+0x2a6/0x310 [ 1469.417938] create_new_namespaces+0xd6/0xb20 [ 1469.418641] copy_namespaces+0x3fb/0x4f0 [ 1469.419287] copy_process+0x385b/0x7800 [ 1469.419913] ? __lockdep_reset_lock+0x180/0x180 [ 1469.420643] ? mark_lock+0xf5/0x2df0 [ 1469.421234] ? lock_acquire+0x197/0x470 [ 1469.421883] ? __cleanup_sighand+0xb0/0xb0 [ 1469.422568] ? _copy_from_user+0xfb/0x1b0 [ 1469.423232] kernel_clone+0xe7/0x980 [ 1469.423813] ? __lockdep_reset_lock+0x180/0x180 [ 1469.424528] ? create_io_thread+0xf0/0xf0 [ 1469.425183] ? ksys_write+0x21a/0x260 [ 1469.425777] ? lock_downgrade+0x6d0/0x6d0 [ 1469.426441] __do_sys_clone3+0x1e5/0x320 [ 1469.427075] ? __do_sys_clone+0x110/0x110 [ 1469.427747] ? rcu_read_lock_any_held+0x75/0xa0 [ 1469.428461] ? vfs_write+0x354/0xa70 [ 1469.429048] ? fput_many+0x2f/0x1a0 [ 1469.429620] ? ksys_write+0x1a9/0x260 [ 1469.430225] ? __ia32_sys_read+0xb0/0xb0 [ 1469.430874] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1469.431688] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1469.432495] ? trace_hardirqs_on+0x5b/0x180 [ 1469.433177] do_syscall_64+0x33/0x40 [ 1469.433767] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1469.434565] RIP: 0033:0x7f33add2bb19 [ 1469.435151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1469.437971] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1469.439165] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1469.440282] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1469.441396] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1469.442518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1469.443627] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:26:50 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/xfrm_stat\x00') perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1f, 0x1, 0xfc, 0x9, 0x0, 0x6, 0x14c1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x2, @perf_bp, 0x10000, 0x20, 0x80, 0x6, 0xecd4, 0x1000, 0x1, 0x0, 0x7fffffff, 0x0, 0x7fff}, r1, 0x6, r0, 0x1) sync() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x4, 0x81, 0x7, 0x8, 0x0, 0x9, 0x800, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0x8}, 0x1300, 0x380, 0xfffffff8, 0x8, 0x2, 0x100, 0xc4b, 0x0, 0x1, 0x0, 0x8}, r1, 0xf, 0xffffffffffffffff, 0xa) 05:26:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000480)={'fscrypt:', @desc2}, &(0x7f00000004c0)={0x0, "d9e803823547c3f49948e537a3dd4af54026580accdeb04ce013e869c8ac155d09e506f965f8881e0cf7e001539dd841e043c6715fa8e994713297147a9cab30", 0x2b}, 0x48, r2) add_key$keyring(&(0x7f0000000380), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="6d3e2f11811d1eb5b3edde1d028a762aede5b423e2d24805f06c457533f1ba3cb93da4a25a399eaddd2cbbd284a7aaf88f87832dfe09c1bf11f18956fba075ac7bbaeb82d8935261dde38a35c91508399a512dc77269b7f8b53303d04b9344fa63c5139ebae428cc0f429a1b942bc34821475e2536c5288e9fd15b9740ede5f3", 0x80, r2) keyctl$revoke(0x3, r0) r3 = add_key$fscrypt_provisioning(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000000000001020305060708090a147f000000000000001d1e1f20292a2b2c2d2e2f303132932c921b3738393a3b3c3d3e3f4000"/72], 0x48, r1) statx(0xffffffffffffffff, 0x0, 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r4, r5, 0x1000) statx(0xffffffffffffffff, 0x0, 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r6, r7, 0x1000) keyctl$chown(0x4, r3, r4, r7) 05:26:50 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x11, 0x0, 0x7fff) pwrite64(r0, &(0x7f00000000c0)="04", 0x1, 0x3ff03) lseek(r1, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./file0\x00', 0x102, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000100)={0x4}) 05:26:50 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000a40), 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x5, 0x3, 0xfc01, 0x40, 0x77, 0x3}, 0xc) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10088, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r2, 0x7, &(0x7f0000000600)={0x1, 0x0, 0x7e32, 0xb1fcdcc}) fcntl$lock(r2, 0x26, &(0x7f0000000600)={0x2, 0x0, 0x0, 0x43}) r3 = pidfd_getfd(r0, r2, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000200)) renameat2(0xffffffffffffffff, &(0x7f0000000540)='./file1\x00', r2, &(0x7f0000000580)='./file0\x00', 0x3) signalfd4(r2, &(0x7f0000000140)={[0xfffffffffffffffc]}, 0x8, 0xc0800) fcntl$lock(r1, 0x5, &(0x7f00000001c0)={0x0, 0x4, 0x4, 0x4, 0xffffffffffffffff}) syz_io_uring_setup(0x450, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000240)=""/168) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x200080, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) 05:26:50 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:26:50 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, 0x0, 0x0, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:27:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:27:07 executing program 7: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/137, 0x89}, {0x0}, {&(0x7f0000000480)=""/102, 0x66}], 0x3, 0x8, 0x6aa12b08) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) readv(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f00000011c0)={0x53, 0xfffffffffffffffd, 0x0, 0x0, @buffer={0x0, 0x1031, &(0x7f0000001240)=""/4108}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x13, 0xffffffffffffffff, 0x8000000) write$binfmt_elf64(r0, &(0x7f0000003600)=ANY=[], 0x1040) fork() [ 1487.270456] FAULT_INJECTION: forcing a failure. [ 1487.270456] name failslab, interval 1, probability 0, space 0, times 0 [ 1487.271609] CPU: 1 PID: 10217 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1487.272181] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1487.272863] Call Trace: [ 1487.273094] dump_stack+0x107/0x167 [ 1487.273397] should_fail.cold+0x5/0xa [ 1487.273715] ? create_object.isra.0+0x3a/0xa20 [ 1487.274087] should_failslab+0x5/0x20 [ 1487.274408] kmem_cache_alloc+0x5b/0x310 [ 1487.274740] ? mark_held_locks+0x9e/0xe0 [ 1487.275078] create_object.isra.0+0x3a/0xa20 [ 1487.275439] kmemleak_alloc_percpu+0xa0/0x100 [ 1487.275811] pcpu_alloc+0x4e2/0x1240 [ 1487.276125] alloc_vfsmnt+0xfd/0x680 [ 1487.276441] clone_mnt+0x6c/0xce0 [ 1487.276730] copy_tree+0x3b0/0xa60 [ 1487.277027] copy_mnt_ns+0x144/0xa00 [ 1487.277331] ? kmem_cache_alloc+0x2a6/0x310 [ 1487.277693] create_new_namespaces+0xd6/0xb20 [ 1487.278065] copy_namespaces+0x3fb/0x4f0 [ 1487.278419] copy_process+0x385b/0x7800 [ 1487.278741] ? __lockdep_reset_lock+0x180/0x180 [ 1487.279117] ? mark_lock+0xf5/0x2df0 [ 1487.279432] ? lock_acquire+0x197/0x470 [ 1487.279769] ? __cleanup_sighand+0xb0/0xb0 [ 1487.280124] ? _copy_from_user+0xfb/0x1b0 [ 1487.280471] kernel_clone+0xe7/0x980 [ 1487.280782] ? __lockdep_reset_lock+0x180/0x180 [ 1487.281163] ? create_io_thread+0xf0/0xf0 [ 1487.281508] ? ksys_write+0x21a/0x260 [ 1487.281826] ? lock_downgrade+0x6d0/0x6d0 [ 1487.282169] __do_sys_clone3+0x1e5/0x320 [ 1487.282501] ? __do_sys_clone+0x110/0x110 [ 1487.282855] ? rcu_read_lock_any_held+0x75/0xa0 [ 1487.283233] ? vfs_write+0x354/0xa70 [ 1487.283538] ? fput_many+0x2f/0x1a0 [ 1487.283834] ? ksys_write+0x1a9/0x260 [ 1487.284142] ? __ia32_sys_read+0xb0/0xb0 [ 1487.284479] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1487.284913] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1487.285327] ? trace_hardirqs_on+0x5b/0x180 [ 1487.285678] do_syscall_64+0x33/0x40 [ 1487.285980] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1487.286402] RIP: 0033:0x7f33add2bb19 [ 1487.286716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1487.288193] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1487.288812] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1487.289390] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1487.289973] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.290554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.291136] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 [ 1487.292923] nfs: Unknown parameter '-' 05:27:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:27:07 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:27:07 executing program 4: r0 = syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="1e54e59cbcf029d5da81dfc36ddd852c62e5e8c895f84e266309c041b892e3c8216e6ea49ea163631d45b5defd2226932451d0d26335d8fe14f185fb7786a362ec3f3e2daa2fa6858ac5e7d1c5ba67a3", 0x50, 0x1}, {&(0x7f0000000380)="37786c201781da0536f50bc9c15161ee018a61903c2eae6623e5779b0372879bcbc1f0184bf16ccfd86567a63965c41dc623b44364accd8232d142b4818fe975b40b155ab963a6cb0aaa5a3fd5c12ac9174ebfaf1052281fa409e6af6b7cd77e5858bccd639532ca2ee8278c53a5fb43eba73b1bdf05f44e158321769161e004d4ac0d43b04a60ce548509a3ba4fbcd4a53928bb487df74715b73090701856968d334d72b0f70d9aafd58310ec851565912939fafd81b64e426b386386839c8c715c12e1193e89d5d8e70d01a7e8a6023c942a70bfb11e72", 0xd8, 0x1}], 0x204400, &(0x7f0000000480)={[{'-'}], [{@subj_role={'subj_role', 0x3d, 'IDLETIMER\x00'}}, {@hash}, {@obj_user={'obj_user', 0x3d, 'IDLETIMER\x00'}}, {@obj_role={'obj_role', 0x3d, 'nl80211\x00'}}, {@uid_lt={'uid<', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@appraise_type}]}) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x1, 0x11e) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000300)={'IDLETIMER\x00'}, &(0x7f0000000340)=0x1e) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="65ea1745a0824ab20000000000000000"]) bind(r2, &(0x7f0000000140)=@ax25={{0x3, @default, 0x8}, [@bcast, @null, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x80) 05:27:07 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 53) 05:27:07 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3"}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:27:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:27:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1487.376338] nfs: Unknown parameter '-' 05:27:07 executing program 4: r0 = syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="1e54e59cbcf029d5da81dfc36ddd852c62e5e8c895f84e266309c041b892e3c8216e6ea49ea163631d45b5defd2226932451d0d26335d8fe14f185fb7786a362ec3f3e2daa2fa6858ac5e7d1c5ba67a3", 0x50, 0x1}, {&(0x7f0000000380)="37786c201781da0536f50bc9c15161ee018a61903c2eae6623e5779b0372879bcbc1f0184bf16ccfd86567a63965c41dc623b44364accd8232d142b4818fe975b40b155ab963a6cb0aaa5a3fd5c12ac9174ebfaf1052281fa409e6af6b7cd77e5858bccd639532ca2ee8278c53a5fb43eba73b1bdf05f44e158321769161e004d4ac0d43b04a60ce548509a3ba4fbcd4a53928bb487df74715b73090701856968d334d72b0f70d9aafd58310ec851565912939fafd81b64e426b386386839c8c715c12e1193e89d5d8e70d01a7e8a6023c942a70bfb11e72", 0xd8, 0x1}], 0x204400, &(0x7f0000000480)={[{'-'}], [{@subj_role={'subj_role', 0x3d, 'IDLETIMER\x00'}}, {@hash}, {@obj_user={'obj_user', 0x3d, 'IDLETIMER\x00'}}, {@obj_role={'obj_role', 0x3d, 'nl80211\x00'}}, {@uid_lt={'uid<', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@appraise_type}]}) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x1, 0x11e) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000300)={'IDLETIMER\x00'}, &(0x7f0000000340)=0x1e) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="65ea1745a0824ab20000000000000000"]) bind(r2, &(0x7f0000000140)=@ax25={{0x3, @default, 0x8}, [@bcast, @null, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x80) 05:27:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1487.542297] nfs: Unknown parameter '-' 05:27:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:27:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000003c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000940)={'#! ', './file1', [{0x20, 'ext4\x00'}, {0x20, 'ext4\x00'}, {0x20, '\xb1%&:'}], 0xa, "5e8d120c9708b2a4b45ebcd4909c2746dfda3e2e34ee948d847810e16b2acfd63dd4d2a5ece3a8abec557dcf9abdb885dd759a7694981f4369b245bee6829c4b45e1d526498f638086355b0384a7891fbcdc3b6b89d78a94b38f909f7e99d3504c03ccee8ae04568e27e456136af29cfdb728054b96df0bfea71c6f90f4421efc4fc065ec75be6a93cc49319c10d31efe84ef570627e7e041cb1f78049341e2dff46c0bac1cabf535805d3a17e41f8cf116dde361aaf4f6b4365c23409a4a77664fa0dba83663d7f1a9cb0bbbf4e3ad94a9ca12497e5d3f8cb9dcd0f69fc52bd1483c16a4e089c19b772c834f9"}, 0x109) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f00000002c0)={{0x9, 0x1}, 0x100, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x55, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x4030a, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, &(0x7f0000000280)=0x10000, 0xc3a, 0x0) 05:27:08 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3"}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:27:08 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 54) 05:27:08 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) recvmsg$unix(r0, &(0x7f0000000980)={&(0x7f0000000200), 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000040)=""/48, 0x30}, {&(0x7f00000002c0)=""/50, 0x32}, {&(0x7f00000003c0)=""/203, 0xcb}, {&(0x7f00000004c0)=""/66, 0x42}, {&(0x7f0000000580)=""/62, 0x3e}, {&(0x7f00000005c0)=""/240, 0xf0}, {&(0x7f0000000700)=""/179, 0xb3}], 0x7, &(0x7f0000000840)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x138}, 0x40010040) sendfile(r2, r1, &(0x7f00000009c0), 0x5) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'batadv0\x00', {0x2, 0x0, @dev}}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000002ec0), 0x4) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x50009401, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={0x0, @generic={0x5, "237f156be341fc76b3a9eedcf157"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, @nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x4}, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x101, 0x54}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x4}, ["", ""]}, 0x14}}, 0x0) r4 = dup2(0xffffffffffffffff, r3) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(r1, &(0x7f0000001700)=""/4099, 0xffffffc9, 0xcd08, 0x0, 0xfffffffffffffe77) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f0000000280)={'batadv_slave_0\x00', {0x2, 0x0, @private}}) [ 1487.812915] FAULT_INJECTION: forcing a failure. [ 1487.812915] name failslab, interval 1, probability 0, space 0, times 0 [ 1487.815218] CPU: 0 PID: 10260 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1487.816339] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1487.817694] Call Trace: [ 1487.818138] dump_stack+0x107/0x167 [ 1487.818743] should_fail.cold+0x5/0xa [ 1487.819365] ? create_object.isra.0+0x3a/0xa20 [ 1487.820125] should_failslab+0x5/0x20 [ 1487.820746] kmem_cache_alloc+0x5b/0x310 [ 1487.821421] create_object.isra.0+0x3a/0xa20 [ 1487.822159] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1487.822993] kmem_cache_alloc+0x159/0x310 [ 1487.823672] alloc_vfsmnt+0x23/0x680 [ 1487.824295] clone_mnt+0x6c/0xce0 [ 1487.824867] copy_tree+0x3b0/0xa60 [ 1487.825475] copy_mnt_ns+0x144/0xa00 [ 1487.826089] ? kmem_cache_alloc+0x2a6/0x310 [ 1487.826793] create_new_namespaces+0xd6/0xb20 [ 1487.827529] copy_namespaces+0x3fb/0x4f0 [ 1487.828174] copy_process+0x385b/0x7800 [ 1487.828831] ? __lockdep_reset_lock+0x180/0x180 [ 1487.829588] ? mark_lock+0xf5/0x2df0 [ 1487.830229] ? lock_acquire+0x197/0x470 [ 1487.830899] ? __cleanup_sighand+0xb0/0xb0 [ 1487.831601] ? _copy_from_user+0xfb/0x1b0 [ 1487.832281] kernel_clone+0xe7/0x980 [ 1487.832880] ? __lockdep_reset_lock+0x180/0x180 [ 1487.833632] ? create_io_thread+0xf0/0xf0 [ 1487.834325] ? ksys_write+0x21a/0x260 [ 1487.834924] ? lock_downgrade+0x6d0/0x6d0 [ 1487.835606] __do_sys_clone3+0x1e5/0x320 [ 1487.836251] ? __do_sys_clone+0x110/0x110 [ 1487.836946] ? rcu_read_lock_any_held+0x75/0xa0 [ 1487.837687] ? vfs_write+0x354/0xa70 [ 1487.838311] ? fput_many+0x2f/0x1a0 [ 1487.838899] ? ksys_write+0x1a9/0x260 [ 1487.839522] ? __ia32_sys_read+0xb0/0xb0 [ 1487.840183] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1487.841039] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1487.841880] ? trace_hardirqs_on+0x5b/0x180 [ 1487.842583] do_syscall_64+0x33/0x40 [ 1487.843191] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1487.843979] RIP: 0033:0x7f33add2bb19 [ 1487.844585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1487.847414] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1487.848635] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1487.849771] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1487.850921] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.852052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.853201] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:27:24 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) recvmsg$unix(r0, &(0x7f0000000980)={&(0x7f0000000200), 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000040)=""/48, 0x30}, {&(0x7f00000002c0)=""/50, 0x32}, {&(0x7f00000003c0)=""/203, 0xcb}, {&(0x7f00000004c0)=""/66, 0x42}, {&(0x7f0000000580)=""/62, 0x3e}, {&(0x7f00000005c0)=""/240, 0xf0}, {&(0x7f0000000700)=""/179, 0xb3}], 0x7, &(0x7f0000000840)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x138}, 0x40010040) sendfile(r2, r1, &(0x7f00000009c0), 0x5) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'batadv0\x00', {0x2, 0x0, @dev}}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000002ec0), 0x4) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x50009401, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={0x0, @generic={0x5, "237f156be341fc76b3a9eedcf157"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, @nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x4}, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x101, 0x54}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x4}, ["", ""]}, 0x14}}, 0x0) r4 = dup2(0xffffffffffffffff, r3) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(r1, &(0x7f0000001700)=""/4099, 0xffffffc9, 0xcd08, 0x0, 0xfffffffffffffe77) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f0000000280)={'batadv_slave_0\x00', {0x2, 0x0, @private}}) 05:27:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:27:24 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3"}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:27:24 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 55) 05:27:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:27:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:27:24 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:27:24 executing program 7: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3"}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1504.290607] FAULT_INJECTION: forcing a failure. [ 1504.290607] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.293307] CPU: 0 PID: 10280 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1504.294552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1504.295981] Call Trace: [ 1504.296392] dump_stack+0x107/0x167 [ 1504.296964] should_fail.cold+0x5/0xa [ 1504.297551] should_failslab+0x5/0x20 [ 1504.298158] __kmalloc_track_caller+0x79/0x370 [ 1504.298874] ? kstrdup_const+0x53/0x80 [ 1504.299463] kstrdup+0x36/0x70 [ 1504.299998] kstrdup_const+0x53/0x80 [ 1504.300583] alloc_vfsmnt+0xb5/0x680 [ 1504.301174] clone_mnt+0x6c/0xce0 [ 1504.301768] copy_tree+0x3b0/0xa60 [ 1504.302335] copy_mnt_ns+0x144/0xa00 [ 1504.303057] ? kmem_cache_alloc+0x2a6/0x310 [ 1504.303730] create_new_namespaces+0xd6/0xb20 [ 1504.304597] copy_namespaces+0x3fb/0x4f0 [ 1504.305367] copy_process+0x385b/0x7800 [ 1504.305968] ? __lockdep_reset_lock+0x180/0x180 [ 1504.306843] ? mark_lock+0xf5/0x2df0 [ 1504.307556] ? lock_acquire+0x197/0x470 [ 1504.308333] ? __cleanup_sighand+0xb0/0xb0 [ 1504.309136] ? _copy_from_user+0xfb/0x1b0 [ 1504.309758] kernel_clone+0xe7/0x980 [ 1504.310474] ? __lockdep_reset_lock+0x180/0x180 [ 1504.311355] ? create_io_thread+0xf0/0xf0 [ 1504.312157] ? ksys_write+0x21a/0x260 [ 1504.312872] ? lock_downgrade+0x6d0/0x6d0 [ 1504.313660] __do_sys_clone3+0x1e5/0x320 [ 1504.314333] ? __do_sys_clone+0x110/0x110 [ 1504.315143] ? rcu_read_lock_any_held+0x75/0xa0 [ 1504.316023] ? vfs_write+0x354/0xa70 [ 1504.316743] ? fput_many+0x2f/0x1a0 [ 1504.317332] ? ksys_write+0x1a9/0x260 [ 1504.318049] ? __ia32_sys_read+0xb0/0xb0 [ 1504.318843] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1504.319842] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1504.320790] ? trace_hardirqs_on+0x5b/0x180 [ 1504.321609] do_syscall_64+0x33/0x40 [ 1504.322205] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1504.323169] RIP: 0033:0x7f33add2bb19 [ 1504.323875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1504.327328] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1504.328762] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1504.330096] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1504.331459] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1504.332797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1504.334128] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:27:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:27:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:27:24 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000100)=0x3f, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)={0x1c, 0x1a, 0xc21, 0x8000, 0x0, {0xa, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}]}, 0x1c}}, 0x0) 05:27:25 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 56) 05:27:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1504.637908] FAULT_INJECTION: forcing a failure. [ 1504.637908] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.639830] CPU: 0 PID: 10302 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1504.640938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1504.642272] Call Trace: [ 1504.642714] dump_stack+0x107/0x167 [ 1504.643320] should_fail.cold+0x5/0xa [ 1504.643939] ? alloc_vfsmnt+0x23/0x680 [ 1504.644440] should_failslab+0x5/0x20 [ 1504.645053] kmem_cache_alloc+0x5b/0x310 [ 1504.645607] ? copy_tree+0x61a/0xa60 [ 1504.646215] alloc_vfsmnt+0x23/0x680 [ 1504.646734] clone_mnt+0x6c/0xce0 [ 1504.647300] copy_tree+0x3b0/0xa60 [ 1504.647795] copy_mnt_ns+0x144/0xa00 [ 1504.648401] ? kmem_cache_alloc+0x2a6/0x310 [ 1504.649122] create_new_namespaces+0xd6/0xb20 [ 1504.649751] copy_namespaces+0x3fb/0x4f0 [ 1504.650425] copy_process+0x385b/0x7800 [ 1504.650972] ? __lockdep_reset_lock+0x180/0x180 [ 1504.651724] ? mark_lock+0xf5/0x2df0 [ 1504.652233] ? lock_acquire+0x197/0x470 [ 1504.652894] ? __cleanup_sighand+0xb0/0xb0 [ 1504.653455] ? _copy_from_user+0xfb/0x1b0 [ 1504.654131] kernel_clone+0xe7/0x980 [ 1504.654648] ? __lockdep_reset_lock+0x180/0x180 [ 1504.655422] ? create_io_thread+0xf0/0xf0 [ 1504.656009] ? ksys_write+0x21a/0x260 [ 1504.656629] ? lock_downgrade+0x6d0/0x6d0 [ 1504.657174] __do_sys_clone3+0x1e5/0x320 [ 1504.657826] ? __do_sys_clone+0x110/0x110 [ 1504.658528] ? rcu_read_lock_any_held+0x75/0xa0 [ 1504.659291] ? vfs_write+0x354/0xa70 [ 1504.659793] ? fput_many+0x2f/0x1a0 [ 1504.660385] ? ksys_write+0x1a9/0x260 [ 1504.660891] ? __ia32_sys_read+0xb0/0xb0 [ 1504.661548] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1504.662227] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1504.663061] ? trace_hardirqs_on+0x5b/0x180 [ 1504.663653] do_syscall_64+0x33/0x40 [ 1504.664257] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1504.664952] RIP: 0033:0x7f33add2bb19 [ 1504.665557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1504.667933] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1504.669160] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1504.670307] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1504.671473] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1504.672622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1504.673766] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:27:25 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000080)) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000008}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x80001) timerfd_create(0x0, 0x0) 05:27:25 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, 0x0, 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:27:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:27:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:27:40 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3"}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:27:40 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000080)) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000008}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x80001) timerfd_create(0x0, 0x0) 05:27:40 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, 0x0) keyctl$link(0x8, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:27:40 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 57) 05:27:40 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, 0x0, 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:27:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1519.632473] FAULT_INJECTION: forcing a failure. [ 1519.632473] name failslab, interval 1, probability 0, space 0, times 0 [ 1519.634289] CPU: 1 PID: 10329 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1519.635160] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1519.636180] Call Trace: [ 1519.636515] dump_stack+0x107/0x167 [ 1519.636977] should_fail.cold+0x5/0xa [ 1519.637454] ? create_object.isra.0+0x3a/0xa20 [ 1519.638025] should_failslab+0x5/0x20 [ 1519.638505] kmem_cache_alloc+0x5b/0x310 [ 1519.639012] create_object.isra.0+0x3a/0xa20 [ 1519.639562] kmemleak_alloc_percpu+0xa0/0x100 [ 1519.640117] pcpu_alloc+0x4e2/0x1240 [ 1519.640602] alloc_vfsmnt+0xfd/0x680 [ 1519.641069] clone_mnt+0x6c/0xce0 [ 1519.641509] copy_tree+0x3b0/0xa60 [ 1519.641962] copy_mnt_ns+0x144/0xa00 [ 1519.642432] ? kmem_cache_alloc+0x2a6/0x310 [ 1519.642980] create_new_namespaces+0xd6/0xb20 [ 1519.643555] copy_namespaces+0x3fb/0x4f0 [ 1519.644067] copy_process+0x385b/0x7800 [ 1519.644569] ? __lockdep_reset_lock+0x180/0x180 [ 1519.645136] ? mark_lock+0xf5/0x2df0 [ 1519.645612] ? lock_acquire+0x197/0x470 [ 1519.646126] ? __cleanup_sighand+0xb0/0xb0 [ 1519.646684] ? _copy_from_user+0xfb/0x1b0 [ 1519.647209] kernel_clone+0xe7/0x980 [ 1519.647679] ? __lockdep_reset_lock+0x180/0x180 [ 1519.648269] ? create_io_thread+0xf0/0xf0 [ 1519.648804] ? ksys_write+0x21a/0x260 [ 1519.649287] ? lock_downgrade+0x6d0/0x6d0 [ 1519.649814] __do_sys_clone3+0x1e5/0x320 [ 1519.650328] ? __do_sys_clone+0x110/0x110 [ 1519.650882] ? rcu_read_lock_any_held+0x75/0xa0 [ 1519.651472] ? vfs_write+0x354/0xa70 [ 1519.651949] ? fput_many+0x2f/0x1a0 [ 1519.652415] ? ksys_write+0x1a9/0x260 [ 1519.652896] ? __ia32_sys_read+0xb0/0xb0 [ 1519.653411] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1519.654073] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1519.654722] ? trace_hardirqs_on+0x5b/0x180 [ 1519.655272] do_syscall_64+0x33/0x40 [ 1519.655744] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1519.656378] RIP: 0033:0x7f33add2bb19 [ 1519.656850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1519.659148] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1519.660108] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1519.660998] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1519.661893] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1519.662805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1519.663698] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:27:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:27:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r3, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000240)=""/202, 0xca}], 0x1) ioctl$FITRIM(r2, 0xc0185879, &(0x7f00000000c0)={0xffff, 0x2, 0x6fe}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) lseek(0xffffffffffffffff, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) 05:27:40 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, 0x0) keyctl$link(0x8, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:27:40 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000080)) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000008}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x80001) timerfd_create(0x0, 0x0) 05:27:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:27:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:27:40 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 58) [ 1520.131571] FAULT_INJECTION: forcing a failure. [ 1520.131571] name failslab, interval 1, probability 0, space 0, times 0 [ 1520.133253] CPU: 1 PID: 10354 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1520.133978] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1520.134798] Call Trace: [ 1520.135084] dump_stack+0x107/0x167 [ 1520.135470] should_fail.cold+0x5/0xa [ 1520.135875] ? create_object.isra.0+0x3a/0xa20 [ 1520.136354] should_failslab+0x5/0x20 [ 1520.136746] kmem_cache_alloc+0x5b/0x310 [ 1520.137167] ? mark_held_locks+0x9e/0xe0 [ 1520.137585] create_object.isra.0+0x3a/0xa20 [ 1520.138053] kmemleak_alloc_percpu+0xa0/0x100 [ 1520.138528] pcpu_alloc+0x4e2/0x1240 [ 1520.138927] alloc_vfsmnt+0xfd/0x680 [ 1520.139317] clone_mnt+0x6c/0xce0 [ 1520.139684] copy_tree+0x3b0/0xa60 [ 1520.140068] copy_mnt_ns+0x144/0xa00 [ 1520.140460] ? kmem_cache_alloc+0x2a6/0x310 [ 1520.140921] create_new_namespaces+0xd6/0xb20 [ 1520.141393] copy_namespaces+0x3fb/0x4f0 [ 1520.141821] copy_process+0x385b/0x7800 [ 1520.142235] ? __lockdep_reset_lock+0x180/0x180 [ 1520.142729] ? mark_lock+0xf5/0x2df0 [ 1520.143133] ? lock_acquire+0x197/0x470 [ 1520.143568] ? __cleanup_sighand+0xb0/0xb0 [ 1520.144025] ? _copy_from_user+0xfb/0x1b0 [ 1520.144468] kernel_clone+0xe7/0x980 [ 1520.144853] ? __lockdep_reset_lock+0x180/0x180 [ 1520.145343] ? create_io_thread+0xf0/0xf0 [ 1520.145793] ? ksys_write+0x21a/0x260 [ 1520.146195] ? lock_downgrade+0x6d0/0x6d0 [ 1520.146551] __do_sys_clone3+0x1e5/0x320 [ 1520.146887] ? __do_sys_clone+0x110/0x110 [ 1520.147242] ? rcu_read_lock_any_held+0x75/0xa0 [ 1520.147632] ? vfs_write+0x354/0xa70 [ 1520.147939] ? fput_many+0x2f/0x1a0 [ 1520.148237] ? ksys_write+0x1a9/0x260 [ 1520.148549] ? __ia32_sys_read+0xb0/0xb0 [ 1520.148881] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1520.149309] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1520.149730] ? trace_hardirqs_on+0x5b/0x180 [ 1520.150086] do_syscall_64+0x33/0x40 [ 1520.150393] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1520.150812] RIP: 0033:0x7f33add2bb19 [ 1520.151118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1520.152646] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1520.153263] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1520.153862] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1520.154457] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1520.155035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1520.155615] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:27:56 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, 0x0, 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:27:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 05:27:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:27:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:27:56 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, 0x0) keyctl$link(0x8, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:27:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="c00000001200ebf60000000000000000ac14140000000000000000000000000000000000000000000000ffffac1414aaf4ff0000000000000000000000100000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/120], 0xc0}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r2, r3, 0x1000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x24, r5}) sendmsg$nl_xfrm(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@getsa={0x11c, 0x12, 0x400, 0x70bd25, 0x25dfdbff, {@in6=@local, 0x4d6, 0x2, 0x2b}, [@sa={0xe4, 0x6, {{@in6=@loopback, @in=@local, 0x4e20, 0x6, 0x4e24, 0x7, 0xa, 0x20, 0xa0, 0xc, 0x0, r2}, {@in6=@mcast2, 0x4d3, 0x3c}, @in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, {0xffffffffffffffc1, 0x101, 0xe1, 0x2, 0xf6, 0x7, 0x800, 0x7}, {0x8, 0x80, 0x7}, {0x7, 0x7, 0x8}, 0x70bd27, 0x3507, 0xa, 0x6, 0xfe, 0x4c}}, @XFRMA_IF_ID={0x8, 0x1f, r5}, @etimer_thresh={0x8, 0xc, 0x7}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4004001}, 0x4) 05:27:56 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 59) 05:27:56 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000080)) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000008}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x80001) timerfd_create(0x0, 0x0) [ 1535.710623] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1535.717234] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1535.726736] FAULT_INJECTION: forcing a failure. [ 1535.726736] name failslab, interval 1, probability 0, space 0, times 0 [ 1535.727781] CPU: 1 PID: 10380 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1535.728380] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1535.729105] Call Trace: [ 1535.729344] dump_stack+0x107/0x167 [ 1535.729677] should_fail.cold+0x5/0xa [ 1535.730019] ? alloc_vfsmnt+0x23/0x680 [ 1535.730372] should_failslab+0x5/0x20 [ 1535.730725] kmem_cache_alloc+0x5b/0x310 [ 1535.731093] ? copy_tree+0x61a/0xa60 [ 1535.731428] alloc_vfsmnt+0x23/0x680 [ 1535.731757] clone_mnt+0x6c/0xce0 [ 1535.732071] copy_tree+0x3b0/0xa60 [ 1535.732398] copy_mnt_ns+0x144/0xa00 [ 1535.732729] ? kmem_cache_alloc+0x2a6/0x310 [ 1535.733112] create_new_namespaces+0xd6/0xb20 [ 1535.733517] copy_namespaces+0x3fb/0x4f0 [ 1535.733888] copy_process+0x385b/0x7800 [ 1535.734247] ? __lockdep_reset_lock+0x180/0x180 [ 1535.734651] ? mark_lock+0xf5/0x2df0 [ 1535.734990] ? lock_acquire+0x197/0x470 [ 1535.735349] ? __cleanup_sighand+0xb0/0xb0 [ 1535.735729] ? _copy_from_user+0xfb/0x1b0 [ 1535.736095] kernel_clone+0xe7/0x980 [ 1535.736421] ? __lockdep_reset_lock+0x180/0x180 [ 1535.736831] ? create_io_thread+0xf0/0xf0 [ 1535.737219] ? ksys_write+0x21a/0x260 [ 1535.737563] ? lock_downgrade+0x6d0/0x6d0 [ 1535.737935] __do_sys_clone3+0x1e5/0x320 [ 1535.738296] ? __do_sys_clone+0x110/0x110 [ 1535.738687] ? rcu_read_lock_any_held+0x75/0xa0 [ 1535.739096] ? vfs_write+0x354/0xa70 [ 1535.739427] ? fput_many+0x2f/0x1a0 [ 1535.739745] ? ksys_write+0x1a9/0x260 [ 1535.740087] ? __ia32_sys_read+0xb0/0xb0 [ 1535.740443] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1535.740897] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1535.741355] ? trace_hardirqs_on+0x5b/0x180 [ 1535.741739] do_syscall_64+0x33/0x40 [ 1535.742075] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1535.742521] RIP: 0033:0x7f33add2bb19 [ 1535.742856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1535.744428] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1535.745080] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1535.745691] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1535.746311] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1535.746927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1535.747542] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:27:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 05:27:56 executing program 4: times(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) socket$inet6_udplite(0xa, 0x2, 0x88) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x8801, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000440)={{0x10b, 0x5, 0x9, 0x243, 0x91, 0x0, 0x5d, 0x3f}, "f82fde06284996227e7ab9c85adffe98438e61a488afa0335b1007817a112a2c31ff50964b5b94b3004a6c40a79ffcc838ab5cdd38153eca57e17fac063a9fddaf489674ccfaccc5b8b5dbac3b4b1ad7aa19354787c0d8183e1c40e9390ea56f9e7f4b0bf048dfaa88b0a751e4b7737af207fcc444adf80fb59a80c7cf2795f18d742d47b494280eae94027f12a2ac73005d3153aa60376b49908383dbbcf15645495bb50c5c341ef291af76bb0523", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5cf) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1535.811879] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:27:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 05:27:56 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 60) 05:27:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) [ 1535.910664] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:27:56 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000080)) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000008}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x80001) 05:27:56 executing program 4: ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{0x1, 0x22}, 'port0\x00', 0x24, 0x0, 0x6, 0x0, 0xfffffffa, 0x7ff, 0x81, 0x0, 0x2, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x10, 0x0, 0x1000002) r2 = dup3(0xffffffffffffffff, r0, 0x80000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000002200010d00feffffffffffff01000000"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000200)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)="8d4a714e62d40dfd816530ddb75c4b2881f6a7a4b2e0f4baa5908f00972d5fb480b5c91f3f2948bd09a5b29e98b235c8a3cd26e5bb75d7", 0x37, 0x7f, 0x0, 0x1, r2}]) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x4e24, @local}, {0x6, @remote}, 0x20, {0x2, 0x4e22, @remote}, 'vxcan1\x00'}) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e21, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x4e1e, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) fallocate(r2, 0x1b, 0x5, 0x3) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) getrandom(0x0, 0x0, 0x0) shutdown(r0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40, 0x2c1) kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 05:27:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) [ 1535.999900] FAULT_INJECTION: forcing a failure. [ 1535.999900] name failslab, interval 1, probability 0, space 0, times 0 [ 1536.001821] CPU: 0 PID: 10403 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1536.002734] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1536.003797] Call Trace: [ 1536.004147] dump_stack+0x107/0x167 [ 1536.004627] should_fail.cold+0x5/0xa [ 1536.005123] ? create_object.isra.0+0x3a/0xa20 [ 1536.005734] should_failslab+0x5/0x20 [ 1536.006236] kmem_cache_alloc+0x5b/0x310 [ 1536.006773] ? __lockdep_reset_lock+0x180/0x180 [ 1536.007373] create_object.isra.0+0x3a/0xa20 [ 1536.007939] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1536.008600] kmem_cache_alloc+0x159/0x310 [ 1536.009162] alloc_vfsmnt+0x23/0x680 [ 1536.009651] clone_mnt+0x6c/0xce0 [ 1536.010107] copy_tree+0x3b0/0xa60 [ 1536.010580] copy_mnt_ns+0x144/0xa00 [ 1536.011071] ? kmem_cache_alloc+0x2a6/0x310 [ 1536.011633] create_new_namespaces+0xd6/0xb20 [ 1536.012237] copy_namespaces+0x3fb/0x4f0 [ 1536.012773] copy_process+0x385b/0x7800 [ 1536.013305] ? __lockdep_reset_lock+0x180/0x180 [ 1536.013921] ? mark_lock+0xf5/0x2df0 [ 1536.014425] ? lock_acquire+0x197/0x470 [ 1536.014968] ? __cleanup_sighand+0xb0/0xb0 [ 1536.015545] ? _copy_from_user+0xfb/0x1b0 [ 1536.016089] kernel_clone+0xe7/0x980 [ 1536.016569] ? __lockdep_reset_lock+0x180/0x180 [ 1536.017180] ? create_io_thread+0xf0/0xf0 [ 1536.017735] ? ksys_write+0x21a/0x260 [ 1536.018232] ? lock_downgrade+0x6d0/0x6d0 [ 1536.018800] __do_sys_clone3+0x1e5/0x320 [ 1536.019342] ? __do_sys_clone+0x110/0x110 [ 1536.019899] ? rcu_read_lock_any_held+0x75/0xa0 [ 1536.020498] ? vfs_write+0x354/0xa70 [ 1536.020989] ? fput_many+0x2f/0x1a0 [ 1536.021474] ? ksys_write+0x1a9/0x260 [ 1536.021975] ? __ia32_sys_read+0xb0/0xb0 [ 1536.022505] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1536.023191] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1536.023854] ? trace_hardirqs_on+0x5b/0x180 [ 1536.024425] do_syscall_64+0x33/0x40 [ 1536.024917] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1536.025590] RIP: 0033:0x7f33add2bb19 [ 1536.026074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1536.028447] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1536.029446] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1536.030362] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1536.031290] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1536.032213] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1536.033128] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:28:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:28:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:28:11 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:28:11 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000080)) 05:28:11 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 61) 05:28:11 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:28:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) [ 1551.230897] FAULT_INJECTION: forcing a failure. [ 1551.230897] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.232618] CPU: 1 PID: 10425 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1551.233553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1551.234678] Call Trace: [ 1551.235054] dump_stack+0x107/0x167 [ 1551.235558] should_fail.cold+0x5/0xa [ 1551.236087] should_failslab+0x5/0x20 [ 1551.236607] __kmalloc_track_caller+0x79/0x370 [ 1551.237227] ? kstrdup_const+0x53/0x80 [ 1551.237765] kstrdup+0x36/0x70 [ 1551.238206] kstrdup_const+0x53/0x80 [ 1551.238715] alloc_vfsmnt+0xb5/0x680 [ 1551.239248] clone_mnt+0x6c/0xce0 [ 1551.239733] copy_tree+0x3b0/0xa60 [ 1551.240236] copy_mnt_ns+0x144/0xa00 [ 1551.240742] ? kmem_cache_alloc+0x2a6/0x310 [ 1551.241332] create_new_namespaces+0xd6/0xb20 [ 1551.241947] copy_namespaces+0x3fb/0x4f0 [ 1551.242503] copy_process+0x385b/0x7800 [ 1551.243058] ? __lockdep_reset_lock+0x180/0x180 [ 1551.243685] ? mark_lock+0xf5/0x2df0 [ 1551.244194] ? lock_acquire+0x197/0x470 [ 1551.244750] ? __cleanup_sighand+0xb0/0xb0 [ 1551.245338] ? _copy_from_user+0xfb/0x1b0 [ 1551.245904] kernel_clone+0xe7/0x980 [ 1551.246407] ? __lockdep_reset_lock+0x180/0x180 [ 1551.247044] ? create_io_thread+0xf0/0xf0 [ 1551.247621] ? ksys_write+0x21a/0x260 [ 1551.248138] ? lock_downgrade+0x6d0/0x6d0 [ 1551.248702] __do_sys_clone3+0x1e5/0x320 [ 1551.249249] ? __do_sys_clone+0x110/0x110 [ 1551.249829] ? rcu_read_lock_any_held+0x75/0xa0 [ 1551.250452] ? vfs_write+0x354/0xa70 [ 1551.250965] ? fput_many+0x2f/0x1a0 [ 1551.251455] ? ksys_write+0x1a9/0x260 [ 1551.251972] ? __ia32_sys_read+0xb0/0xb0 [ 1551.252523] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1551.253229] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1551.253919] ? trace_hardirqs_on+0x5b/0x180 [ 1551.254503] do_syscall_64+0x33/0x40 [ 1551.255011] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1551.255697] RIP: 0033:0x7f33add2bb19 [ 1551.256200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1551.258634] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1551.259666] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1551.260618] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1551.261570] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1551.262524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1551.263479] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:28:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1000000, 0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = syz_open_procfs(r2, &(0x7f0000000040)='net/xfrm_stat\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f0000000300)=0xc) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000980)={0x0, 0x0}) syz_open_procfs(r6, &(0x7f0000000200)='attr/current\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000001220000000000000002000000"], 0x14}}, 0x0) recvmmsg(r7, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) sendmsg$netlink(r1, &(0x7f0000000940)={&(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000008c0)=[{&(0x7f00000001c0)={0x40, 0x16, 0x20, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x8, 0x6e, 0x0, 0x0, @pid=r2}, @typed={0x14, 0x5b, 0x0, 0x0, @ipv6=@mcast2}, @nested={0xc, 0x92, 0x0, 0x1, [@typed={0x6, 0x39, 0x0, 0x0, @str=':\x00'}]}, @typed={0x8, 0x28, 0x0, 0x0, @u32=0xdb0e}]}, 0x40}, {&(0x7f0000000340)={0x498, 0x3d, 0x20, 0x70bd27, 0x25dfdbfb, "", [@nested={0x1c8, 0x2b, 0x0, 0x1, [@typed={0x8, 0x39, 0x0, 0x0, @pid=r5}, @generic="6e3e7a20bcf623d89d46216bab79230bfcc775a45c5ed154f5e3609e3cc23b93edc820e566bd0441adbdc6aae6b9d3e7a3c83ec28a04d8fd5fa308aa4936a19b71475d59384bb1e8b2166a4837bea38bdde946abed0ffafb1adfe13fce7049f83342065525a61477c823a32db6d50e79af8f514b1f4c5dd641874c72d465f5acde3c5a8be0af6b56ab47957fae8b765e7b78b59c1193c080e722c91785646eaba81b6b74be379dd7d358fad7182bea8be14ad7bc4644d26df57ab68ea698cbb8ffaa89fc169efea12d00378ea63d596a70dd81fb", @generic="263033f3c8abfce1995d1498b5b45d5d89d890721fb28ef55bcf7db6ac84b41f1eeddb303ab0bdc7e34af2c0577c365a3e7e6c0157e7d514cbafb4faaaa7e0f7313f5132e51435a41dfd8a507ccfc8876a2d554065464a292327e81318caaca261aa39729258b9f1770dd3f7e18dd98fd5138686bf7628ce5d79c28b6c97444de2e7f38cf800dad0c17ccdeb22b65a33f45f59a5c7e1f1877366c61a9d9e7423da4d83bfa80b8ccb599817366f8ecffad15f9adbf08ac19e9413af7932ead4e854ec3f72dae4fbb30a6e0e5b4ed28dc75f181c79288675032fece8f9", @typed={0xc, 0x58, 0x0, 0x0, @u64=0x9}]}, @typed={0xc, 0x2, 0x0, 0x0, @u64=0x3}, @typed={0x5, 0x4e, 0x0, 0x0, @str='\x00'}, @generic="c1e40262e32f888044f278b7097c83463a5bc2d41224f118cd4ec37bc7216b0e09a421d51a911de40ffb8f8aecdc7da98c4ecfe72a30def0ee8d3fb8964cbb2cfe2afc60c96d43bae225174a0999cdd368", @nested={0xd3, 0x5f, 0x0, 0x1, [@generic="a2885941a50b53c928a20b7a2fb269ac634545b3f70d1f3cd6316708b5fd3c9cf3e24762ba1dea28095e377223e6cc88f272488087ae28d8c0f7e28a1d85743b87ab805ba3b5d097142da561df746e21d6d9c07366cc5a74684425262c5d", @generic="09b27d9cbc9a6a5787a999888791f3b5ba495ecd88e23ef95b4899cf6e3771f23e1fb3b5a502f40f42fefb79a7210605f60b0f272d0de278011e331cf9a464dcd4413eef3469f64064c2c39dde4ab7ad4fe5a11142cb252bfab4edeef09b93227d3abbe3122f1bcfea3d1c03582f0d5384"]}, @typed={0x4, 0x3f}, @nested={0x180, 0x59, 0x0, 0x1, [@typed={0x34, 0x2c, 0x0, 0x0, @binary="5492193f9c7b832be3be4d2a30f14d0ac2824e0e58248bc2154f0c0d60c3f82ff96253c84113fc5c6cbac17c0d358b8c"}, @generic="acf0979e8a285aec5c3c5bef736d1641e356d86f421008f1db7d18253d2db440ac5c4fa0762dfe0460090aa7865f5357814118b76799033cdfe0fa28bb4df48ad6d267dda0f7ca7ea48ef74f88836949045fdfd770a392c2e73ce4c13d392043d5fd8c90dc94d78ff385b3b84e8bc6d23f383d7485da0af88ca8be688be0d2b0", @typed={0xc2, 0x86, 0x0, 0x0, @binary="77a74c5813fc217369715ae79e54812af01edc848d2f1d68f4b47e4464f5546b8e7a0cdbf9174ebf7c3ba329e659d0847bd849439ba36dd0d856d960e457df56eb8950b0f048e39e180b883e5fdc125d3214328ca766048885f3c6602fb49b1b5c1ca053e3815d16b2829913c1164762c3d09de939e9634ecadd1db6bc1d1e07ca5b38433d53ca8952564d25aa9ea956932d8becefa642aa8582413e19978906e9f89f4fe5a9e11b3952ce88ac1521b611bd03e4865e6b5ea72279b61262"}, @typed={0x4, 0x6d}]}]}, 0x498}, {&(0x7f0000000800)={0x7c, 0x11, 0x300, 0x70bd2b, 0x25dfdbfd, "", [@nested={0x4, 0x13}, @typed={0x8, 0x57, 0x0, 0x0, @ipv4=@private=0xa010102}, @typed={0x55, 0x4c, 0x0, 0x0, @binary="992790cfc2ade3d30ef7a88e8662f0cd12af8111d1052675ec8a1e1b2a058ded7d1f3c2518dde25c04414d19c4a71a7d343540feffd6eaf5e0e430b43914ca014ecea85509e222e89bb40e954a6cd09e74"}, @typed={0x8, 0x27, 0x0, 0x0, @fd=r7}]}, 0x7c}], 0x3, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x20000800}, 0x40000) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3fefc4327c35d5f4c097347fb24dc1b3b1ba18171798bdc0062ea0b5e364eee2b3dc94c1742ea96765c683f90df0000000100"}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)="480300000013890000004c435ce0f87181858ced753d49d807b2a18956fc", 0x1e}], 0x1}, 0x0) 05:28:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:28:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:28:11 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 62) 05:28:11 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)) 05:28:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 1551.550484] FAULT_INJECTION: forcing a failure. [ 1551.550484] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.552832] CPU: 0 PID: 10441 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1551.554154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1551.555757] Call Trace: [ 1551.556270] dump_stack+0x107/0x167 [ 1551.556989] should_fail.cold+0x5/0xa [ 1551.557726] ? alloc_vfsmnt+0x23/0x680 [ 1551.558483] should_failslab+0x5/0x20 [ 1551.559221] kmem_cache_alloc+0x5b/0x310 [ 1551.560007] ? copy_tree+0x61a/0xa60 [ 1551.560733] alloc_vfsmnt+0x23/0x680 [ 1551.561462] clone_mnt+0x6c/0xce0 [ 1551.562148] copy_tree+0x3b0/0xa60 [ 1551.562872] copy_mnt_ns+0x144/0xa00 [ 1551.563595] ? kmem_cache_alloc+0x2a6/0x310 [ 1551.564437] create_new_namespaces+0xd6/0xb20 [ 1551.565307] copy_namespaces+0x3fb/0x4f0 [ 1551.566088] copy_process+0x385b/0x7800 [ 1551.566849] ? __lockdep_reset_lock+0x180/0x180 [ 1551.567749] ? mark_lock+0xf5/0x2df0 [ 1551.568470] ? lock_acquire+0x197/0x470 [ 1551.569258] ? __cleanup_sighand+0xb0/0xb0 [ 1551.570086] ? _copy_from_user+0xfb/0x1b0 [ 1551.570896] kernel_clone+0xe7/0x980 [ 1551.571603] ? __lockdep_reset_lock+0x180/0x180 [ 1551.572489] ? create_io_thread+0xf0/0xf0 [ 1551.573307] ? ksys_write+0x21a/0x260 [ 1551.574036] ? lock_downgrade+0x6d0/0x6d0 [ 1551.574837] __do_sys_clone3+0x1e5/0x320 [ 1551.575620] ? __do_sys_clone+0x110/0x110 [ 1551.576437] ? rcu_read_lock_any_held+0x75/0xa0 [ 1551.577323] ? vfs_write+0x354/0xa70 [ 1551.578044] ? fput_many+0x2f/0x1a0 [ 1551.578743] ? ksys_write+0x1a9/0x260 [ 1551.579481] ? __ia32_sys_read+0xb0/0xb0 [ 1551.580265] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1551.581251] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1551.582218] ? trace_hardirqs_on+0x5b/0x180 [ 1551.583044] do_syscall_64+0x33/0x40 [ 1551.583747] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1551.584721] RIP: 0033:0x7f33add2bb19 [ 1551.585423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1551.588884] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1551.590313] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1551.591656] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1551.593002] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1551.594341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1551.595684] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:28:12 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:28:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) 05:28:28 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:28:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) 05:28:28 executing program 4: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000003c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000400)=0x5) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000880)=@rc={0x1f, @none}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000940)=""/149, 0x95}], 0x1}, 0x2) syz_open_procfs(0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/70, 0x46, 0xfffffffffffffff8) r1 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x39, 0x30, 0x32, 0x39, 0x0, 0x38, 0x37, 0x2c, 0x34, 0x38]}}}}]}) mknodat$loop(r1, &(0x7f0000000240)='./mnt\x00', 0x0, 0x0) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x115549713482a633, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=unix,rootcontext=system_u,smackfsroot=prefer,fsmagic=0x0000000000000004,uid<', @ANYRESDEC=r2, @ANYBLOB=',dont_measure,fowner>', @ANYRESDEC=r3, @ANYBLOB=',fsmagyc=0x0000001000000006,\x00']) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r4, &(0x7f0000005080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="18b22a00890804ac1414bb00d58c4520462561"], 0x18}}], 0x1, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r5, &(0x7f0000000580)=[{&(0x7f0000001380)=""/213, 0xd5}, {&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x3, 0x5545, 0x0) open_tree(r5, &(0x7f00000002c0)='./file0\x00', 0x9100) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000000)) 05:28:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:28:28 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 63) 05:28:28 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:28:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:28:28 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 1567.900459] FAULT_INJECTION: forcing a failure. [ 1567.900459] name failslab, interval 1, probability 0, space 0, times 0 [ 1567.902446] CPU: 0 PID: 10458 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1567.903560] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1567.904898] Call Trace: [ 1567.905335] dump_stack+0x107/0x167 [ 1567.905929] should_fail.cold+0x5/0xa [ 1567.906546] ? create_object.isra.0+0x3a/0xa20 [ 1567.907291] should_failslab+0x5/0x20 [ 1567.907898] kmem_cache_alloc+0x5b/0x310 [ 1567.908575] create_object.isra.0+0x3a/0xa20 [ 1567.909313] kmemleak_alloc_percpu+0xa0/0x100 [ 1567.910023] pcpu_alloc+0x4e2/0x1240 [ 1567.910662] alloc_vfsmnt+0xfd/0x680 [ 1567.911268] clone_mnt+0x6c/0xce0 [ 1567.911851] copy_tree+0x3b0/0xa60 [ 1567.912454] copy_mnt_ns+0x144/0xa00 [ 1567.913067] ? kmem_cache_alloc+0x2a6/0x310 [ 1567.913787] create_new_namespaces+0xd6/0xb20 [ 1567.914534] copy_namespaces+0x3fb/0x4f0 [ 1567.915202] copy_process+0x385b/0x7800 [ 1567.915868] ? __lockdep_reset_lock+0x180/0x180 [ 1567.916493] tmpfs: Bad value for 'mpol' [ 1567.916622] ? mark_lock+0xf5/0x2df0 [ 1567.917869] ? lock_acquire+0x197/0x470 [ 1567.918545] ? __cleanup_sighand+0xb0/0xb0 [ 1567.919255] ? _copy_from_user+0xfb/0x1b0 [ 1567.919934] kernel_clone+0xe7/0x980 [ 1567.920534] ? __lockdep_reset_lock+0x180/0x180 [ 1567.921284] ? create_io_thread+0xf0/0xf0 [ 1567.921951] ? ksys_write+0x21a/0x260 [ 1567.922570] ? lock_downgrade+0x6d0/0x6d0 [ 1567.923249] __do_sys_clone3+0x1e5/0x320 [ 1567.923917] ? __do_sys_clone+0x110/0x110 [ 1567.924615] ? rcu_read_lock_any_held+0x75/0xa0 [ 1567.925368] ? vfs_write+0x354/0xa70 [ 1567.925966] ? fput_many+0x2f/0x1a0 [ 1567.926556] ? ksys_write+0x1a9/0x260 [ 1567.927199] ? __ia32_sys_read+0xb0/0xb0 [ 1567.927876] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1567.928722] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1567.929562] ? trace_hardirqs_on+0x5b/0x180 [ 1567.930278] do_syscall_64+0x33/0x40 [ 1567.930886] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1567.931696] RIP: 0033:0x7f33add2bb19 [ 1567.932296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1567.935252] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1567.936491] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1567.937627] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1567.938764] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1567.939920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1567.941073] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 [ 1567.967945] tmpfs: Bad value for 'mpol' 05:28:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) 05:28:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid=0xee01}, @nested={0x8, 0x18, 0x0, 0x1, [@generic='\x00\x00\x00\x00']}]}, 0x24}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x2, 0x4) 05:28:28 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 05:28:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x1, 0x0) 05:28:28 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000), 0xf5, 0x10000) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000240)={0x53, 0xfffffffffffffffb, 0x6a, 0x2, @scatter={0x1, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/162, 0xa2}]}, &(0x7f0000000140)="18ce94c4587db1579e0813793250a589a091bc981e3795ab42194af36fc0a26e402381f222b0a828d6caf215961cf0a798d2c9d71568d9d60efc2ab2604c0916e35e1dee196a85a60a8e47aa2bade029339cff247c3ef60ca3e438eb04660f99187412d2dda6dcbf74fc", &(0x7f00000001c0)=""/45, 0x401, 0x1, 0x0, &(0x7f0000000200)}) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0xf7, 0x0, 0x1, 0x20, 0x6, @local}, 0x14) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) fcntl$dupfd(r1, 0x406, r0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000300)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = openat(r1, &(0x7f0000000380)='./file0\x00', 0x2180, 0x89) r4 = syz_open_dev$evdev(&(0x7f00000003c0), 0x7, 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {0x377}}, './file0\x00'}) r5 = getpid() r6 = syz_open_procfs(r5, &(0x7f0000000440)='net/rt_acct\x00') ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) prlimit64(r5, 0x3, 0x0, &(0x7f0000000480)) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f00000004c0)=0x1) prlimit64(r5, 0xe, 0x0, &(0x7f0000000500)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0x40, 0xff, 0x42, @remote, @dev={0xfe, 0x80, '\x00', 0x44}, 0x10, 0x7800, 0xb, 0x1}}) setsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000600)={@private0={0xfc, 0x0, '\x00', 0x1}, r7}, 0x14) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000680)) 05:28:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x1, 0x0) 05:28:28 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 05:28:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xb, 0x30, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x0, 0x1}}) dup2(r0, 0xffffffffffffffff) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) sendmsg$SEG6_CMD_SETHMAC(r2, 0x0, 0x0) execveat(r2, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000004c0)=[&(0x7f00000003c0)='\n]#!:+/(.^\x00', &(0x7f0000000400)='%&)\x00', &(0x7f0000000440)='-!*-\'\x00', &(0x7f0000000480)=',+-\x00'], &(0x7f00000005c0)=[&(0x7f0000000500)='/dev/snd/timer\x00', &(0x7f0000000540)='-:\x00', &(0x7f0000000580)='/dev/snd/timer\x00'], 0x0) r3 = epoll_create(0x8000) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x5) epoll_wait(r3, &(0x7f0000000080)=[{}], 0x1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_READ=@pass_buffer={0x16, 0x1, 0x0, @fd=r3, 0x9, &(0x7f0000000140)=""/26, 0x1a, 0x4, 0x1}, 0x1) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x1001000, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'rose0\x00'}) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x20, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0x11}) 05:28:29 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:28:29 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 64) 05:28:29 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1568.594353] FAULT_INJECTION: forcing a failure. [ 1568.594353] name failslab, interval 1, probability 0, space 0, times 0 [ 1568.596197] CPU: 1 PID: 10499 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1568.597219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1568.598428] Call Trace: [ 1568.598841] dump_stack+0x107/0x167 [ 1568.599386] should_fail.cold+0x5/0xa [ 1568.599953] ? create_object.isra.0+0x3a/0xa20 [ 1568.600630] should_failslab+0x5/0x20 [ 1568.601186] kmem_cache_alloc+0x5b/0x310 [ 1568.601802] ? mark_held_locks+0x9e/0xe0 [ 1568.602403] create_object.isra.0+0x3a/0xa20 [ 1568.603076] kmemleak_alloc_percpu+0xa0/0x100 [ 1568.603756] pcpu_alloc+0x4e2/0x1240 [ 1568.604323] alloc_vfsmnt+0xfd/0x680 [ 1568.604884] clone_mnt+0x6c/0xce0 [ 1568.605399] copy_tree+0x3b0/0xa60 [ 1568.605964] copy_mnt_ns+0x144/0xa00 [ 1568.606506] ? kmem_cache_alloc+0x2a6/0x310 [ 1568.607163] create_new_namespaces+0xd6/0xb20 [ 1568.607836] copy_namespaces+0x3fb/0x4f0 [ 1568.608431] copy_process+0x385b/0x7800 [ 1568.609034] ? __lockdep_reset_lock+0x180/0x180 [ 1568.609738] ? mark_lock+0xf5/0x2df0 [ 1568.610288] ? lock_acquire+0x197/0x470 [ 1568.610920] ? __cleanup_sighand+0xb0/0xb0 [ 1568.611591] ? _copy_from_user+0xfb/0x1b0 [ 1568.612224] kernel_clone+0xe7/0x980 [ 1568.612785] ? __lockdep_reset_lock+0x180/0x180 [ 1568.613470] ? create_io_thread+0xf0/0xf0 [ 1568.614125] ? ksys_write+0x21a/0x260 [ 1568.614736] ? lock_downgrade+0x6d0/0x6d0 [ 1568.615407] __do_sys_clone3+0x1e5/0x320 [ 1568.616018] ? __do_sys_clone+0x110/0x110 [ 1568.616650] ? rcu_read_lock_any_held+0x75/0xa0 [ 1568.617316] ? vfs_write+0x354/0xa70 [ 1568.617865] ? fput_many+0x2f/0x1a0 [ 1568.618383] ? ksys_write+0x1a9/0x260 [ 1568.618951] ? __ia32_sys_read+0xb0/0xb0 [ 1568.619551] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1568.620310] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1568.621053] ? trace_hardirqs_on+0x5b/0x180 [ 1568.621694] do_syscall_64+0x33/0x40 [ 1568.622226] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1568.622982] RIP: 0033:0x7f33add2bb19 [ 1568.623537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1568.626181] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1568.627307] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1568.628355] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1568.629384] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1568.630401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1568.631437] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 [ 1568.780456] EXT4-fs (sda): re-mounted. Opts: (null) 05:28:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:28:46 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(r0, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), 0x0) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:28:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x1, 0x0) 05:28:46 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) 05:28:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:28:46 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:28:46 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:28:46 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 65) [ 1586.114420] FAULT_INJECTION: forcing a failure. [ 1586.114420] name failslab, interval 1, probability 0, space 0, times 0 [ 1586.116416] CPU: 1 PID: 10526 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1586.117481] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1586.118759] Call Trace: [ 1586.119188] dump_stack+0x107/0x167 [ 1586.119781] should_fail.cold+0x5/0xa [ 1586.120388] ? alloc_vfsmnt+0x23/0x680 [ 1586.121015] should_failslab+0x5/0x20 [ 1586.121628] kmem_cache_alloc+0x5b/0x310 [ 1586.122276] ? copy_tree+0x61a/0xa60 [ 1586.122869] alloc_vfsmnt+0x23/0x680 [ 1586.123476] clone_mnt+0x6c/0xce0 [ 1586.124036] copy_tree+0x3b0/0xa60 [ 1586.124615] copy_mnt_ns+0x144/0xa00 [ 1586.125203] ? kmem_cache_alloc+0x2a6/0x310 [ 1586.125904] create_new_namespaces+0xd6/0xb20 [ 1586.126630] copy_namespaces+0x3fb/0x4f0 [ 1586.127292] copy_process+0x385b/0x7800 [ 1586.127932] ? __lockdep_reset_lock+0x180/0x180 [ 1586.128670] ? mark_lock+0xf5/0x2df0 [ 1586.129269] ? lock_acquire+0x197/0x470 [ 1586.129929] ? __cleanup_sighand+0xb0/0xb0 [ 1586.130623] ? _copy_from_user+0xfb/0x1b0 [ 1586.131320] kernel_clone+0xe7/0x980 [ 1586.131917] ? __lockdep_reset_lock+0x180/0x180 [ 1586.132672] ? create_io_thread+0xf0/0xf0 [ 1586.133385] ? ksys_write+0x21a/0x260 [ 1586.133994] ? lock_downgrade+0x6d0/0x6d0 [ 1586.134648] __do_sys_clone3+0x1e5/0x320 [ 1586.135334] ? __do_sys_clone+0x110/0x110 [ 1586.136015] ? rcu_read_lock_any_held+0x75/0xa0 [ 1586.136757] ? vfs_write+0x354/0xa70 [ 1586.137357] ? fput_many+0x2f/0x1a0 [ 1586.137937] ? ksys_write+0x1a9/0x260 [ 1586.138536] ? __ia32_sys_read+0xb0/0xb0 [ 1586.139190] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1586.140041] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1586.140850] ? trace_hardirqs_on+0x5b/0x180 [ 1586.141547] do_syscall_64+0x33/0x40 [ 1586.142135] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1586.142953] RIP: 0033:0x7f33add2bb19 [ 1586.143555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1586.146443] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1586.147631] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1586.148758] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1586.149879] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1586.151014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1586.152129] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:28:46 executing program 4: sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1481228}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0xd18f45e80f7c2f41, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4040000) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000d00)=[{{&(0x7f0000000100)=@abs, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/160, 0xa0}, {&(0x7f0000000240)=""/147, 0x93}, {&(0x7f0000000300)=""/163, 0xa3}, {&(0x7f00000003c0)=""/174, 0xae}, {&(0x7f0000000480)=""/32, 0x20}, {&(0x7f00000004c0)=""/188, 0xbc}, {&(0x7f0000000580)=""/177, 0xb1}, {&(0x7f0000000640)=""/187, 0xbb}, {&(0x7f0000000700)=""/244, 0xf4}, {&(0x7f0000000800)=""/138, 0x8a}], 0xa, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1c00000000000000200000020000006df30faa91cf958241a5a5dd4eae094dd86b2521d28ca1d3705ec0f79b37d76f39a83ec32fe2842bebc56e050fe87f108c5d8f156fc293523d75a6550cd500ca3c43ac355a3f6d72b664ee326b94b3c459a9b7bc979638e07115f26e1fdb1fa3786c6e4efa", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x60}}, {{&(0x7f0000000a00), 0x6e, &(0x7f0000000c80)=[{&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/5, 0x5}, {&(0x7f0000000ac0)=""/87, 0x57}, {&(0x7f0000000b40)=""/109, 0x6d}, {&(0x7f0000000bc0)=""/157, 0x9d}], 0x5}}], 0x2, 0x0, &(0x7f0000000d80)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8466}, r1, 0xffffffffffffffff, r0, 0x0) readv(r0, &(0x7f0000001ac0)=[{&(0x7f0000001680)=""/186, 0xba}], 0x1) 05:28:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)}], 0x1}}], 0x1, 0x0) 05:28:46 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = epoll_create(0x7ffd) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) 05:28:46 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 66) 05:28:46 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:28:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)}], 0x1}}], 0x1, 0x0) 05:28:46 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1586.519510] FAULT_INJECTION: forcing a failure. [ 1586.519510] name failslab, interval 1, probability 0, space 0, times 0 [ 1586.521749] CPU: 0 PID: 10546 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1586.522914] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1586.524302] Call Trace: [ 1586.524748] dump_stack+0x107/0x167 [ 1586.525378] should_fail.cold+0x5/0xa [ 1586.526036] ? create_object.isra.0+0x3a/0xa20 [ 1586.526805] should_failslab+0x5/0x20 [ 1586.527451] kmem_cache_alloc+0x5b/0x310 [ 1586.528128] ? __lockdep_reset_lock+0x180/0x180 [ 1586.528911] create_object.isra.0+0x3a/0xa20 [ 1586.529656] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1586.530524] kmem_cache_alloc+0x159/0x310 [ 1586.531227] alloc_vfsmnt+0x23/0x680 [ 1586.531862] clone_mnt+0x6c/0xce0 [ 1586.532455] copy_tree+0x3b0/0xa60 [ 1586.533080] copy_mnt_ns+0x144/0xa00 [ 1586.533711] ? kmem_cache_alloc+0x2a6/0x310 [ 1586.534438] create_new_namespaces+0xd6/0xb20 [ 1586.535197] copy_namespaces+0x3fb/0x4f0 [ 1586.535887] copy_process+0x385b/0x7800 [ 1586.536554] ? __lockdep_reset_lock+0x180/0x180 [ 1586.537330] ? mark_lock+0xf5/0x2df0 [ 1586.537973] ? lock_acquire+0x197/0x470 [ 1586.538668] ? __cleanup_sighand+0xb0/0xb0 [ 1586.539398] ? _copy_from_user+0xfb/0x1b0 [ 1586.540101] kernel_clone+0xe7/0x980 [ 1586.540723] ? __lockdep_reset_lock+0x180/0x180 [ 1586.541508] ? create_io_thread+0xf0/0xf0 [ 1586.542233] ? ksys_write+0x21a/0x260 [ 1586.542878] ? lock_downgrade+0x6d0/0x6d0 [ 1586.543587] __do_sys_clone3+0x1e5/0x320 [ 1586.544266] ? __do_sys_clone+0x110/0x110 [ 1586.544981] ? rcu_read_lock_any_held+0x75/0xa0 [ 1586.545755] ? vfs_write+0x354/0xa70 [ 1586.546392] ? fput_many+0x2f/0x1a0 [ 1586.547010] ? ksys_write+0x1a9/0x260 [ 1586.547660] ? __ia32_sys_read+0xb0/0xb0 [ 1586.548345] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1586.549218] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1586.550076] ? trace_hardirqs_on+0x5b/0x180 [ 1586.550810] do_syscall_64+0x33/0x40 [ 1586.551443] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1586.552297] RIP: 0033:0x7f33add2bb19 [ 1586.552921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1586.555976] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1586.557243] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1586.558426] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1586.559617] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1586.560813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1586.562009] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:28:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)}], 0x1}}], 0x1, 0x0) 05:29:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:29:02 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:29:02 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 67) 05:29:02 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)) 05:29:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 1) 05:29:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:29:02 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:29:02 executing program 4: r0 = dup(0xffffffffffffffff) ftruncate(r0, 0x0) sendmsg$AUDIT_TTY_GET(r0, 0x0, 0x400c810) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)=""/18, 0x12}], 0x1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340)=0x1f, 0x7) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x6, 'gre0\x00', {0xf6}, 0x7}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/ldiscs\x00', 0x0, 0x0) lseek(r2, 0x3ad3, 0x4) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x6, 0x9, 0x6, 0xff, 0x9e}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000001c0)={0x0, 0x6, 0x674, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x0, 0x265, 0x0, 0x2, 0x0, 0x0, 0x800}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x204380, 0x0) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000300), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000000440)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x30, r4, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0xe, 0x3, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8855}, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) renameat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)=""/60, 0x3c}, {&(0x7f0000000280)=""/109, 0x6d}], 0x2, 0x8, 0x3) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) [ 1602.508856] FAULT_INJECTION: forcing a failure. [ 1602.508856] name failslab, interval 1, probability 0, space 0, times 0 [ 1602.511275] CPU: 1 PID: 10575 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1602.512489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1602.513922] Call Trace: [ 1602.514392] dump_stack+0x107/0x167 [ 1602.515022] should_fail.cold+0x5/0xa [ 1602.515709] should_failslab+0x5/0x20 [ 1602.516367] __kmalloc_track_caller+0x79/0x370 [ 1602.517168] ? kstrdup_const+0x53/0x80 [ 1602.517844] kstrdup+0x36/0x70 [ 1602.518407] kstrdup_const+0x53/0x80 [ 1602.519051] alloc_vfsmnt+0xb5/0x680 [ 1602.519721] clone_mnt+0x6c/0xce0 [ 1602.520338] copy_tree+0x3b0/0xa60 [ 1602.520983] copy_mnt_ns+0x144/0xa00 [ 1602.521629] ? kmem_cache_alloc+0x2a6/0x310 [ 1602.522391] create_new_namespaces+0xd6/0xb20 [ 1602.523173] copy_namespaces+0x3fb/0x4f0 [ 1602.523898] copy_process+0x385b/0x7800 [ 1602.524585] ? __lockdep_reset_lock+0x180/0x180 [ 1602.525395] ? mark_lock+0xf5/0x2df0 [ 1602.526047] ? lock_acquire+0x197/0x470 [ 1602.526763] ? __cleanup_sighand+0xb0/0xb0 [ 1602.527519] ? _copy_from_user+0xfb/0x1b0 [ 1602.528255] kernel_clone+0xe7/0x980 [ 1602.528896] ? __lockdep_reset_lock+0x180/0x180 [ 1602.529714] ? create_io_thread+0xf0/0xf0 [ 1602.530450] ? ksys_write+0x21a/0x260 [ 1602.531110] ? lock_downgrade+0x6d0/0x6d0 [ 1602.531828] __do_sys_clone3+0x1e5/0x320 [ 1602.532531] ? __do_sys_clone+0x110/0x110 [ 1602.533292] ? rcu_read_lock_any_held+0x75/0xa0 [ 1602.534088] ? vfs_write+0x354/0xa70 [ 1602.534743] ? fput_many+0x2f/0x1a0 [ 1602.535368] ? ksys_write+0x1a9/0x260 [ 1602.536047] ? __ia32_sys_read+0xb0/0xb0 [ 1602.536752] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1602.537662] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1602.538541] ? trace_hardirqs_on+0x5b/0x180 [ 1602.539307] do_syscall_64+0x33/0x40 [ 1602.539946] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1602.540835] RIP: 0033:0x7f33add2bb19 [ 1602.541479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1602.544651] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1602.545954] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1602.547188] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1602.548435] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1602.549660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1602.550874] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:29:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:29:03 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:29:03 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)) 05:29:03 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 68) 05:29:03 executing program 4: r0 = syz_io_uring_setup(0x498b, &(0x7f0000000400), &(0x7f00000a0000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00000003c0)=0x0, &(0x7f0000000000)=0x0) r3 = syz_io_uring_setup(0x3153, &(0x7f0000000140), &(0x7f0000fef000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r0, 0x0, 0x0}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8001) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, {0x0, r7}}, 0x0) r8 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r8, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0xc6da2cc48da8a1c7}, 0x0) syz_io_uring_setup(0x7a88, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) [ 1602.941276] FAULT_INJECTION: forcing a failure. [ 1602.941276] name failslab, interval 1, probability 0, space 0, times 0 [ 1602.943188] CPU: 1 PID: 10699 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1602.944182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1602.945371] Call Trace: [ 1602.945759] dump_stack+0x107/0x167 [ 1602.946295] should_fail.cold+0x5/0xa [ 1602.946848] ? create_object.isra.0+0x3a/0xa20 [ 1602.947531] should_failslab+0x5/0x20 [ 1602.948084] kmem_cache_alloc+0x5b/0x310 [ 1602.948688] create_object.isra.0+0x3a/0xa20 [ 1602.949330] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1602.950075] __kmalloc_track_caller+0x177/0x370 [ 1602.950750] ? kstrdup_const+0x53/0x80 [ 1602.951329] kstrdup+0x36/0x70 [ 1602.951809] kstrdup_const+0x53/0x80 [ 1602.952357] alloc_vfsmnt+0xb5/0x680 [ 1602.952902] clone_mnt+0x6c/0xce0 [ 1602.953429] copy_tree+0x3b0/0xa60 [ 1602.953965] copy_mnt_ns+0x144/0xa00 [ 1602.954522] ? kmem_cache_alloc+0x2a6/0x310 [ 1602.955168] create_new_namespaces+0xd6/0xb20 [ 1602.955833] copy_namespaces+0x3fb/0x4f0 [ 1602.956427] copy_process+0x385b/0x7800 [ 1602.957002] ? __lockdep_reset_lock+0x180/0x180 [ 1602.957691] ? lock_acquire+0x197/0x470 [ 1602.958295] ? __cleanup_sighand+0xb0/0xb0 [ 1602.958928] ? _copy_from_user+0xfb/0x1b0 [ 1602.959593] kernel_clone+0xe7/0x980 [ 1602.960156] ? create_io_thread+0xf0/0xf0 [ 1602.960765] ? lock_downgrade+0x6d0/0x6d0 [ 1602.961380] __do_sys_clone3+0x1e5/0x320 [ 1602.961962] ? __do_sys_clone+0x110/0x110 [ 1602.962562] ? recalibrate_cpu_khz+0x10/0x10 [ 1602.963213] ? tick_program_event+0xa8/0x140 [ 1602.963849] ? hrtimer_interrupt+0x771/0x9b0 [ 1602.964510] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1602.965275] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1602.966005] ? trace_hardirqs_on+0x5b/0x180 [ 1602.966631] do_syscall_64+0x33/0x40 [ 1602.967173] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1602.967906] RIP: 0033:0x7f33add2bb19 [ 1602.968438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1602.971037] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1602.972150] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1602.973238] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1602.974253] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1602.975270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1602.976295] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:29:03 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) open_tree(r0, &(0x7f0000000440)='./file1\x00', 0x1800) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)) 05:29:03 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c36"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:29:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:29:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:29:18 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c36"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:29:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x7, 0x8, 0x3, 0x0, 0x5, 0x20600, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x527, 0x0, @perf_config_ext={0x3, 0x9}, 0xa000, 0x8, 0x0, 0x7, 0x81, 0xd1d, 0xff, 0x0, 0x8, 0x0, 0xfffffffffffffe00}, 0xffffffffffffffff, 0x1, r0, 0x2) syz_io_uring_setup(0x6036, &(0x7f00000000c0)={0x0, 0x9f4c, 0xa, 0x0, 0x2f9}, &(0x7f0000fed000/0x13000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r3, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write(r3, &(0x7f0000000480)="054c2df030339aa2e69c0b8b94aa70bc908022", 0x13) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000016140), 0xffffffffffffffff) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r6, &(0x7f0000016580)={0x0, 0x0, &(0x7f0000016540)={&(0x7f00000007c0)={0x34, r5, 0x1, 0x200, 0x2, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x0, 0x7, 0x1}, @ETHTOOL_A_RINGS_RX_JUMBO={0xfffffffffffffe90, 0x9, 0x6}]}, 0x80241fd2a3006439}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x4, 0x2, 0x3, 0x9, 0x48, @loopback, @private2, 0x8, 0x1e, 0x401, 0x6}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000005c0)=ANY=[@ANYBLOB="83010000000100d9ec18000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r8, 0x8918, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x24, r9}) openat$sr(0xffffffffffffff9c, &(0x7f0000000840), 0x8001, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000000800)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)={0x27c, r5, 0x112, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_SOPASS={0x4}, @ETHTOOL_A_WOL_SOPASS={0xa5, 0x3, "c7614fb8509448d66d28742c4c11358d94f38ef53d4d264148971cbf4c9e61030107744cc92532f8e5bec471aa5153ecdb2ff253f3fa6c4369583d5c1196c729b95eba836768c8592f1f6ebbae88486fbb3237ec3885e5f712f220c10bdf034c119302717c7a3231df40697bd95d628bab4fe887f7c0935b0ace2a5737dff3a87560670ec28fcd813b7dc6f7a7d94b5678879ea16bce6d8aad65286610cde31d50"}, @ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_WOL_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_WOL_SOPASS={0x1c, 0x3, "7ab0c168f4defd1539098566f2c2c41b522e45bd36c3f57e"}, @ETHTOOL_A_WOL_MODES={0xcc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x51, 0x5, "4e4d108eeaa391fb6e2b280019df38e45d96ee66ca34d2fdebfc554dab27d0163c003ea5560fccfbadfdb617f2636cea6daf4f7a2aa2b785150c83b7efc0f4f718e7d787fa61f211e7b242ffef"}, @ETHTOOL_A_BITSET_MASK={0x62, 0x5, "a487a469115bffb1d230a31b6852f32168573b2323cf2a92fc16839117bf727be057173f832707e36529cda2284799c32917aa21ba5a0baf2781448aef1bad6feb68fbc591fd5a876bfbed700ff5991de83baf5fdb8208ba61eae614c89b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_WOL_SOPASS={0x91, 0x3, "a49c4677d59192ca7e087d2d5df787f1446a40808b103c2a40a2973c40ae59362337fba228ae72772c2b74e5b4223aff8716fe4a103c49e3abeb685ea2df18de8f01b9328d0892266c3cedfe759661adc8edb9b68111a3d599d272f06646c20be297a87ae099491fd6819113520278304fd4ad1b9274022df0545e656ac341a494d47366d8f91b99c4a7dc2310"}]}, 0x27c}, 0x1, 0x0, 0x0, 0x840}, 0x840) syz_io_uring_submit(r2, 0x0, &(0x7f00000003c0)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r1, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)=""/211, 0xd3}], 0x1, &(0x7f0000000340)=""/11, 0xb}, 0x0, 0x2000, 0x0, {0x1}}, 0x7c) 05:29:18 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="88352e4f38bdbd192106a670a124e8b4ab2e18824c5dab40934522d68010437338f4097628b5f79ed2555c06655e7fbae868e7d0c93191fd", 0x38, 0x9c}, {&(0x7f0000000180)="bbc9b3a8d252a46e1543fe659a12fe3cd97f2651df05d2d9c6", 0x19, 0xa652}, {&(0x7f0000000340)="19d6c8dcf925ec9365cc4c42f275163dc3267027bdea4bea52d73a7ba3b01244de27d84ff80702edd4521737488179ecd9ce7ba1eebc505a09e17e9c42e7a400ac4c3dc8c88433d497a2ee0bd23e185f8c1eee742a06a5fd68da00acdf141df1bc939fee4d279820810e8cc8fe9910f80f28d078064b72647c6bbc62982b99569733f79ed153d955021819749478e1fbd36e57bffc0daff07c8cab", 0x9b, 0x239be85c}, {&(0x7f00000001c0)="adc5898d1a3aaeffd2e2f37a1b3e0df1d071d495c5ef95bf345abbc80f52c194ca01de2e3d070de40cc0e8ec027f7ff957430c98f5b3f7a7bc0cc63afefa2edc5caacc5d00c89281f7bfcf6c0e1a0f7cee52efbc42876038bf0d1f608cef50cd094e91d3d9029ef2621e3d471a247a3ce5b2fc734f07090df86bd157a762", 0x7e, 0x8a1}, {&(0x7f0000000440), 0x0, 0x800}], 0xa01000, &(0x7f0000000500)={[{'nl80211\x00'}, {'nl80211\x00'}, {'nl80211\x00'}], [{@dont_measure}, {@obj_role={'obj_role', 0x3d, '$)'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:18 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 69) 05:29:18 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:29:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1618.195850] FAULT_INJECTION: forcing a failure. [ 1618.195850] name failslab, interval 1, probability 0, space 0, times 0 [ 1618.197416] CPU: 0 PID: 10825 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1618.198198] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1618.199131] Call Trace: [ 1618.199444] dump_stack+0x107/0x167 [ 1618.199876] should_fail.cold+0x5/0xa [ 1618.200327] ? create_object.isra.0+0x3a/0xa20 [ 1618.200848] should_failslab+0x5/0x20 [ 1618.201280] kmem_cache_alloc+0x5b/0x310 [ 1618.201746] create_object.isra.0+0x3a/0xa20 [ 1618.202262] kmemleak_alloc_percpu+0xa0/0x100 [ 1618.202789] pcpu_alloc+0x4e2/0x1240 [ 1618.203238] alloc_vfsmnt+0xfd/0x680 [ 1618.203676] clone_mnt+0x6c/0xce0 [ 1618.204084] copy_tree+0x3b0/0xa60 [ 1618.204504] copy_mnt_ns+0x144/0xa00 [ 1618.204925] ? kmem_cache_alloc+0x2a6/0x310 [ 1618.205421] create_new_namespaces+0xd6/0xb20 [ 1618.205942] copy_namespaces+0x3fb/0x4f0 [ 1618.206414] copy_process+0x385b/0x7800 [ 1618.206862] ? __lockdep_reset_lock+0x180/0x180 [ 1618.207386] ? mark_lock+0xf5/0x2df0 [ 1618.207824] ? lock_acquire+0x197/0x470 [ 1618.208292] ? __cleanup_sighand+0xb0/0xb0 [ 1618.208782] ? _copy_from_user+0xfb/0x1b0 [ 1618.209262] kernel_clone+0xe7/0x980 [ 1618.209679] ? __lockdep_reset_lock+0x180/0x180 [ 1618.210206] ? create_io_thread+0xf0/0xf0 [ 1618.210688] ? ksys_write+0x21a/0x260 [ 1618.211125] ? lock_downgrade+0x6d0/0x6d0 [ 1618.211594] __do_sys_clone3+0x1e5/0x320 [ 1618.212056] ? __do_sys_clone+0x110/0x110 [ 1618.212534] ? rcu_read_lock_any_held+0x75/0xa0 [ 1618.213065] ? vfs_write+0x354/0xa70 [ 1618.213496] ? fput_many+0x2f/0x1a0 [ 1618.213910] ? ksys_write+0x1a9/0x260 [ 1618.214348] ? __ia32_sys_read+0xb0/0xb0 [ 1618.214820] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1618.215412] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1618.215990] ? trace_hardirqs_on+0x5b/0x180 [ 1618.216528] do_syscall_64+0x33/0x40 [ 1618.217056] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1618.217635] RIP: 0033:0x7f33add2bb19 [ 1618.218053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1618.220134] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1618.221060] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1618.221854] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1618.222663] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1618.223456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1618.224262] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:29:18 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x84000, 0x12) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:18 executing program 4: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SEND={0x1a, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0, 0xc014}, 0x3) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x3a}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 05:29:19 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/locks\x00', 0x0, 0x0) lseek(r1, 0x9e46, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) sendfile(r0, r1, &(0x7f0000000000)=0x81, 0x1) 05:29:19 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:19 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c36"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:29:19 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 70) 05:29:19 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x38) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='security.selinux\x00', &(0x7f0000000280)=""/21, 0x15) bind(r0, &(0x7f0000000140)=@hci={0x1f, 0x3, 0x103f4de805978ee9}, 0x80) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000000)) [ 1618.853809] FAULT_INJECTION: forcing a failure. [ 1618.853809] name failslab, interval 1, probability 0, space 0, times 0 [ 1618.856181] CPU: 1 PID: 10952 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1618.857338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1618.858713] Call Trace: [ 1618.859171] dump_stack+0x107/0x167 [ 1618.859811] should_fail.cold+0x5/0xa [ 1618.860467] ? create_object.isra.0+0x3a/0xa20 [ 1618.861248] should_failslab+0x5/0x20 [ 1618.861895] kmem_cache_alloc+0x5b/0x310 [ 1618.862580] ? mark_held_locks+0x9e/0xe0 [ 1618.863270] create_object.isra.0+0x3a/0xa20 [ 1618.864044] kmemleak_alloc_percpu+0xa0/0x100 [ 1618.864798] pcpu_alloc+0x4e2/0x1240 [ 1618.865468] alloc_vfsmnt+0xfd/0x680 [ 1618.866100] clone_mnt+0x6c/0xce0 [ 1618.866702] copy_tree+0x3b0/0xa60 [ 1618.867333] copy_mnt_ns+0x144/0xa00 [ 1618.867986] ? kmem_cache_alloc+0x2a6/0x310 [ 1618.868729] create_new_namespaces+0xd6/0xb20 [ 1618.869489] copy_namespaces+0x3fb/0x4f0 [ 1618.870185] copy_process+0x385b/0x7800 [ 1618.870863] ? __lockdep_reset_lock+0x180/0x180 [ 1618.871641] ? mark_lock+0xf5/0x2df0 [ 1618.872300] ? lock_acquire+0x197/0x470 [ 1618.872995] ? __cleanup_sighand+0xb0/0xb0 [ 1618.873728] ? _copy_from_user+0xfb/0x1b0 [ 1618.874433] kernel_clone+0xe7/0x980 [ 1618.875058] ? __lockdep_reset_lock+0x180/0x180 [ 1618.875859] ? create_io_thread+0xf0/0xf0 [ 1618.876576] ? ksys_write+0x21a/0x260 [ 1618.877218] ? lock_downgrade+0x6d0/0x6d0 [ 1618.877927] __do_sys_clone3+0x1e5/0x320 [ 1618.878607] ? __do_sys_clone+0x110/0x110 [ 1618.879343] ? rcu_read_lock_any_held+0x75/0xa0 [ 1618.880125] ? vfs_write+0x354/0xa70 [ 1618.880752] ? fput_many+0x2f/0x1a0 [ 1618.881369] ? ksys_write+0x1a9/0x260 [ 1618.882001] ? __ia32_sys_read+0xb0/0xb0 [ 1618.882691] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1618.883566] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1618.884435] ? trace_hardirqs_on+0x5b/0x180 [ 1618.885166] do_syscall_64+0x33/0x40 [ 1618.885796] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1618.886646] RIP: 0033:0x7f33add2bb19 [ 1618.887277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1618.890308] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1618.891569] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1618.892752] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1618.893930] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1618.895099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1618.896274] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:29:19 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:29:33 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 71) 05:29:33 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db512"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:29:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1633.349466] FAULT_INJECTION: forcing a failure. [ 1633.349466] name failslab, interval 1, probability 0, space 0, times 0 [ 1633.351184] CPU: 0 PID: 10967 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1633.351949] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1633.352837] Call Trace: [ 1633.353134] dump_stack+0x107/0x167 [ 1633.353557] should_fail.cold+0x5/0xa [ 1633.353999] ? alloc_vfsmnt+0x23/0x680 [ 1633.354429] should_failslab+0x5/0x20 [ 1633.354850] kmem_cache_alloc+0x5b/0x310 [ 1633.355301] ? copy_tree+0x61a/0xa60 [ 1633.355721] alloc_vfsmnt+0x23/0x680 [ 1633.356144] clone_mnt+0x6c/0xce0 [ 1633.356534] copy_tree+0x3b0/0xa60 [ 1633.356942] copy_mnt_ns+0x144/0xa00 [ 1633.357358] ? kmem_cache_alloc+0x2a6/0x310 [ 1633.357846] create_new_namespaces+0xd6/0xb20 [ 1633.358360] copy_namespaces+0x3fb/0x4f0 [ 1633.358820] copy_process+0x385b/0x7800 [ 1633.359266] ? __lockdep_reset_lock+0x180/0x180 [ 1633.359769] ? mark_lock+0xf5/0x2df0 [ 1633.360201] ? lock_acquire+0x197/0x470 [ 1633.360656] ? __cleanup_sighand+0xb0/0xb0 [ 1633.361141] ? _copy_from_user+0xfb/0x1b0 [ 1633.361608] kernel_clone+0xe7/0x980 [ 1633.362021] ? __lockdep_reset_lock+0x180/0x180 [ 1633.362534] ? create_io_thread+0xf0/0xf0 [ 1633.363006] ? ksys_write+0x21a/0x260 [ 1633.363424] ? lock_downgrade+0x6d0/0x6d0 05:29:33 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:33 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:33 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:29:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1633.363971] __do_sys_clone3+0x1e5/0x320 [ 1633.364455] ? __do_sys_clone+0x110/0x110 [ 1633.365128] ? rcu_read_lock_any_held+0x75/0xa0 [ 1633.366044] ? vfs_write+0x354/0xa70 [ 1633.366784] ? fput_many+0x2f/0x1a0 [ 1633.367512] ? ksys_write+0x1a9/0x260 [ 1633.368290] ? __ia32_sys_read+0xb0/0xb0 [ 1633.369112] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1633.370163] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1633.371193] ? trace_hardirqs_on+0x5b/0x180 [ 1633.372070] do_syscall_64+0x33/0x40 [ 1633.372811] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1633.373829] RIP: 0033:0x7f33add2bb19 [ 1633.374573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1633.378200] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1633.379701] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1633.381110] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1633.382522] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1633.383925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1633.385323] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:29:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:29:33 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:33 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 72) [ 1633.490463] FAULT_INJECTION: forcing a failure. [ 1633.490463] name failslab, interval 1, probability 0, space 0, times 0 [ 1633.491508] CPU: 1 PID: 10985 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1633.492080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1633.492762] Call Trace: [ 1633.492990] dump_stack+0x107/0x167 [ 1633.493303] should_fail.cold+0x5/0xa [ 1633.493624] ? create_object.isra.0+0x3a/0xa20 [ 1633.494004] should_failslab+0x5/0x20 [ 1633.494328] kmem_cache_alloc+0x5b/0x310 [ 1633.494660] ? __lockdep_reset_lock+0x180/0x180 [ 1633.495042] create_object.isra.0+0x3a/0xa20 [ 1633.495398] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1633.495824] kmem_cache_alloc+0x159/0x310 [ 1633.496167] alloc_vfsmnt+0x23/0x680 [ 1633.496473] clone_mnt+0x6c/0xce0 [ 1633.496763] copy_tree+0x3b0/0xa60 [ 1633.497065] copy_mnt_ns+0x144/0xa00 [ 1633.497369] ? kmem_cache_alloc+0x2a6/0x310 [ 1633.497728] create_new_namespaces+0xd6/0xb20 [ 1633.498095] copy_namespaces+0x3fb/0x4f0 [ 1633.498430] copy_process+0x385b/0x7800 [ 1633.498757] ? __lockdep_reset_lock+0x180/0x180 [ 1633.499134] ? mark_lock+0xf5/0x2df0 [ 1633.499439] ? lock_acquire+0x197/0x470 [ 1633.499777] ? __cleanup_sighand+0xb0/0xb0 [ 1633.500139] ? _copy_from_user+0xfb/0x1b0 [ 1633.500483] kernel_clone+0xe7/0x980 [ 1633.500783] ? __lockdep_reset_lock+0x180/0x180 [ 1633.501173] ? create_io_thread+0xf0/0xf0 [ 1633.501528] ? ksys_write+0x21a/0x260 [ 1633.501840] ? lock_downgrade+0x6d0/0x6d0 [ 1633.502187] __do_sys_clone3+0x1e5/0x320 [ 1633.502524] ? __do_sys_clone+0x110/0x110 [ 1633.502875] ? rcu_read_lock_any_held+0x75/0xa0 [ 1633.503250] ? vfs_write+0x354/0xa70 [ 1633.503564] ? fput_many+0x2f/0x1a0 [ 1633.503873] ? ksys_write+0x1a9/0x260 [ 1633.504190] ? __ia32_sys_read+0xb0/0xb0 [ 1633.504526] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1633.504961] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1633.505381] ? trace_hardirqs_on+0x5b/0x180 [ 1633.505733] do_syscall_64+0x33/0x40 [ 1633.506041] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1633.506460] RIP: 0033:0x7f33add2bb19 [ 1633.506759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1633.508244] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1633.508861] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1633.509435] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1633.510007] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1633.510602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1633.511192] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:29:34 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:34 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:34 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db512"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:29:34 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = epoll_create(0x7ffd) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 05:29:34 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:29:34 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 73) 05:29:34 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) [ 1633.782315] FAULT_INJECTION: forcing a failure. [ 1633.782315] name failslab, interval 1, probability 0, space 0, times 0 [ 1633.783508] CPU: 1 PID: 11003 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1633.784085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1633.784765] Call Trace: [ 1633.784986] dump_stack+0x107/0x167 [ 1633.785292] should_fail.cold+0x5/0xa [ 1633.785607] should_failslab+0x5/0x20 [ 1633.785924] __kmalloc_track_caller+0x79/0x370 [ 1633.786299] ? kstrdup_const+0x53/0x80 [ 1633.786625] kstrdup+0x36/0x70 [ 1633.786895] kstrdup_const+0x53/0x80 [ 1633.787206] alloc_vfsmnt+0xb5/0x680 [ 1633.787509] clone_mnt+0x6c/0xce0 [ 1633.787795] copy_tree+0x3b0/0xa60 [ 1633.788110] copy_mnt_ns+0x144/0xa00 [ 1633.788414] ? kmem_cache_alloc+0x2a6/0x310 [ 1633.788774] create_new_namespaces+0xd6/0xb20 [ 1633.789139] copy_namespaces+0x3fb/0x4f0 [ 1633.789481] copy_process+0x385b/0x7800 [ 1633.789807] ? __lockdep_reset_lock+0x180/0x180 [ 1633.790190] ? mark_lock+0xf5/0x2df0 [ 1633.790499] ? lock_acquire+0x197/0x470 [ 1633.790837] ? __cleanup_sighand+0xb0/0xb0 [ 1633.791191] ? _copy_from_user+0xfb/0x1b0 [ 1633.791538] kernel_clone+0xe7/0x980 [ 1633.791853] ? __lockdep_reset_lock+0x180/0x180 [ 1633.792250] ? create_io_thread+0xf0/0xf0 [ 1633.792602] ? ksys_write+0x21a/0x260 [ 1633.792915] ? lock_downgrade+0x6d0/0x6d0 [ 1633.793260] __do_sys_clone3+0x1e5/0x320 [ 1633.793583] ? __do_sys_clone+0x110/0x110 [ 1633.793927] ? rcu_read_lock_any_held+0x75/0xa0 [ 1633.794305] ? vfs_write+0x354/0xa70 [ 1633.794618] ? fput_many+0x2f/0x1a0 [ 1633.794909] ? ksys_write+0x1a9/0x260 [ 1633.795219] ? __ia32_sys_read+0xb0/0xb0 [ 1633.795551] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1633.795979] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1633.796395] ? trace_hardirqs_on+0x5b/0x180 [ 1633.796749] do_syscall_64+0x33/0x40 [ 1633.797052] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1633.797468] RIP: 0033:0x7f33add2bb19 [ 1633.797774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1633.799261] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1633.799899] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1633.800474] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1633.801060] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1633.801635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1633.802221] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:29:49 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:49 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = epoll_create(0x7ffd) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 05:29:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:29:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:29:49 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:29:49 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 74) 05:29:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:29:49 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db512"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1648.564809] FAULT_INJECTION: forcing a failure. [ 1648.564809] name failslab, interval 1, probability 0, space 0, times 0 [ 1648.566942] CPU: 1 PID: 11019 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1648.568040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1648.569340] Call Trace: [ 1648.569786] dump_stack+0x107/0x167 [ 1648.570369] should_fail.cold+0x5/0xa [ 1648.570977] ? create_object.isra.0+0x3a/0xa20 [ 1648.571712] should_failslab+0x5/0x20 [ 1648.572323] kmem_cache_alloc+0x5b/0x310 [ 1648.572979] create_object.isra.0+0x3a/0xa20 [ 1648.573681] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1648.574490] __kmalloc_track_caller+0x177/0x370 [ 1648.575230] ? kstrdup_const+0x53/0x80 [ 1648.575861] kstrdup+0x36/0x70 [ 1648.576397] kstrdup_const+0x53/0x80 [ 1648.576991] alloc_vfsmnt+0xb5/0x680 [ 1648.577590] clone_mnt+0x6c/0xce0 [ 1648.578209] copy_tree+0x3b0/0xa60 [ 1648.578802] copy_mnt_ns+0x144/0xa00 [ 1648.579402] ? kmem_cache_alloc+0x2a6/0x310 [ 1648.580111] create_new_namespaces+0xd6/0xb20 [ 1648.580837] copy_namespaces+0x3fb/0x4f0 [ 1648.581537] copy_process+0x385b/0x7800 [ 1648.582182] ? __lockdep_reset_lock+0x180/0x180 [ 1648.582920] ? mark_lock+0xf5/0x2df0 [ 1648.583556] ? lock_acquire+0x197/0x470 [ 1648.584227] ? __cleanup_sighand+0xb0/0xb0 [ 1648.584928] ? _copy_from_user+0xfb/0x1b0 [ 1648.585607] kernel_clone+0xe7/0x980 [ 1648.586210] ? __lockdep_reset_lock+0x180/0x180 [ 1648.586953] ? create_io_thread+0xf0/0xf0 [ 1648.587638] ? ksys_write+0x21a/0x260 [ 1648.588260] ? lock_downgrade+0x6d0/0x6d0 [ 1648.588927] __do_sys_clone3+0x1e5/0x320 [ 1648.589601] ? __do_sys_clone+0x110/0x110 [ 1648.590307] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1648.591143] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1648.592019] ? trace_hardirqs_on+0x5b/0x180 [ 1648.592707] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1648.593584] ? __ia32_sys_clone+0x150/0x150 [ 1648.594278] ? __x64_sys_clone3+0x1/0x70 [ 1648.594936] do_syscall_64+0x33/0x40 [ 1648.595534] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1648.596359] RIP: 0033:0x7f33add2bb19 [ 1648.596957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1648.599877] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1648.601106] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1648.602238] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1648.603370] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1648.604512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1648.605666] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:29:49 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:49 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:49 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:29:49 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 75) 05:29:49 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = epoll_create(0x7ffd) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 05:29:49 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:29:49 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) [ 1649.042475] FAULT_INJECTION: forcing a failure. [ 1649.042475] name failslab, interval 1, probability 0, space 0, times 0 [ 1649.044560] CPU: 1 PID: 11046 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1649.045657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1649.046969] Call Trace: [ 1649.047402] dump_stack+0x107/0x167 [ 1649.047993] should_fail.cold+0x5/0xa [ 1649.048619] ? create_object.isra.0+0x3a/0xa20 [ 1649.049349] should_failslab+0x5/0x20 [ 1649.049956] kmem_cache_alloc+0x5b/0x310 [ 1649.050611] create_object.isra.0+0x3a/0xa20 [ 1649.051314] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1649.052132] __kmalloc_track_caller+0x177/0x370 [ 1649.052877] ? kstrdup_const+0x53/0x80 [ 1649.053513] kstrdup+0x36/0x70 [ 1649.054036] kstrdup_const+0x53/0x80 [ 1649.054634] alloc_vfsmnt+0xb5/0x680 [ 1649.055231] clone_mnt+0x6c/0xce0 [ 1649.055803] copy_tree+0x3b0/0xa60 [ 1649.056407] copy_mnt_ns+0x144/0xa00 [ 1649.057007] ? kmem_cache_alloc+0x2a6/0x310 [ 1649.057710] create_new_namespaces+0xd6/0xb20 [ 1649.058434] copy_namespaces+0x3fb/0x4f0 [ 1649.059093] copy_process+0x385b/0x7800 [ 1649.059726] ? __lockdep_reset_lock+0x180/0x180 [ 1649.060480] ? mark_lock+0xf5/0x2df0 [ 1649.061077] ? lock_acquire+0x197/0x470 [ 1649.061739] ? __cleanup_sighand+0xb0/0xb0 [ 1649.062430] ? _copy_from_user+0xfb/0x1b0 [ 1649.063111] kernel_clone+0xe7/0x980 [ 1649.063705] ? __lockdep_reset_lock+0x180/0x180 [ 1649.064452] ? create_io_thread+0xf0/0xf0 [ 1649.065130] ? ksys_write+0x21a/0x260 [ 1649.065738] ? lock_downgrade+0x6d0/0x6d0 [ 1649.066405] __do_sys_clone3+0x1e5/0x320 [ 1649.067056] ? __do_sys_clone+0x110/0x110 [ 1649.067747] ? rcu_read_lock_any_held+0x75/0xa0 [ 1649.068482] ? vfs_write+0x354/0xa70 [ 1649.069084] ? fput_many+0x2f/0x1a0 [ 1649.069666] ? ksys_write+0x1a9/0x260 [ 1649.070276] ? __ia32_sys_read+0xb0/0xb0 [ 1649.070925] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1649.071745] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1649.072568] ? trace_hardirqs_on+0x5b/0x180 [ 1649.073261] do_syscall_64+0x33/0x40 [ 1649.073857] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1649.074672] RIP: 0033:0x7f33add2bb19 [ 1649.075260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1649.078135] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1649.079340] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1649.080446] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1649.081565] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1649.082727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1649.083843] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:29:49 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:30:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:30:04 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) 05:30:04 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:30:04 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd60"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:30:04 executing program 7: r0 = epoll_create(0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:04 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 76) 05:30:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1664.009851] FAULT_INJECTION: forcing a failure. [ 1664.009851] name failslab, interval 1, probability 0, space 0, times 0 [ 1664.012194] CPU: 0 PID: 11076 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1664.013380] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1664.014797] Call Trace: [ 1664.015256] dump_stack+0x107/0x167 [ 1664.015893] should_fail.cold+0x5/0xa [ 1664.016561] ? create_object.isra.0+0x3a/0xa20 [ 1664.017349] should_failslab+0x5/0x20 [ 1664.018004] kmem_cache_alloc+0x5b/0x310 [ 1664.018705] ? mark_held_locks+0x9e/0xe0 [ 1664.019409] create_object.isra.0+0x3a/0xa20 [ 1664.020183] kmemleak_alloc_percpu+0xa0/0x100 [ 1664.020956] pcpu_alloc+0x4e2/0x1240 [ 1664.021618] alloc_vfsmnt+0xfd/0x680 [ 1664.022257] clone_mnt+0x6c/0xce0 [ 1664.022869] copy_tree+0x3b0/0xa60 [ 1664.023498] copy_mnt_ns+0x144/0xa00 [ 1664.024147] ? kmem_cache_alloc+0x2a6/0x310 [ 1664.024899] create_new_namespaces+0xd6/0xb20 [ 1664.025684] copy_namespaces+0x3fb/0x4f0 [ 1664.026384] copy_process+0x385b/0x7800 [ 1664.027074] ? __lockdep_reset_lock+0x180/0x180 [ 1664.027868] ? mark_lock+0xf5/0x2df0 05:30:04 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) [ 1664.028527] ? lock_acquire+0x197/0x470 [ 1664.029361] ? __cleanup_sighand+0xb0/0xb0 [ 1664.030098] ? _copy_from_user+0xfb/0x1b0 [ 1664.030810] kernel_clone+0xe7/0x980 [ 1664.031439] ? __lockdep_reset_lock+0x180/0x180 [ 1664.032239] ? create_io_thread+0xf0/0xf0 [ 1664.032959] ? ksys_write+0x21a/0x260 [ 1664.033656] ? lock_downgrade+0x6d0/0x6d0 [ 1664.034364] __do_sys_clone3+0x1e5/0x320 [ 1664.035049] ? __do_sys_clone+0x110/0x110 [ 1664.035786] ? rcu_read_lock_any_held+0x75/0xa0 [ 1664.036578] ? vfs_write+0x354/0xa70 [ 1664.037224] ? fput_many+0x2f/0x1a0 [ 1664.037844] ? ksys_write+0x1a9/0x260 [ 1664.038497] ? __ia32_sys_read+0xb0/0xb0 [ 1664.039192] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1664.040086] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1664.040969] ? trace_hardirqs_on+0x5b/0x180 [ 1664.041705] do_syscall_64+0x33/0x40 [ 1664.042337] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1664.043198] RIP: 0033:0x7f33add2bb19 [ 1664.043830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1664.046914] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1664.048198] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1664.049391] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1664.050593] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1664.051788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1664.052986] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:30:04 executing program 7: r0 = epoll_create(0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:04 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) 05:30:04 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd60"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:30:04 executing program 7: r0 = epoll_create(0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:04 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:30:04 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:30:22 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:30:22 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:30:22 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:22 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd60"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:30:22 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 77) 05:30:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x8, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1681.836851] FAULT_INJECTION: forcing a failure. [ 1681.836851] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.839240] CPU: 0 PID: 11118 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1681.840465] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1681.841928] Call Trace: [ 1681.842404] dump_stack+0x107/0x167 [ 1681.843059] should_fail.cold+0x5/0xa [ 1681.843739] ? alloc_vfsmnt+0x23/0x680 [ 1681.844454] should_failslab+0x5/0x20 [ 1681.845124] kmem_cache_alloc+0x5b/0x310 [ 1681.845839] ? copy_tree+0x61a/0xa60 [ 1681.846504] alloc_vfsmnt+0x23/0x680 [ 1681.847147] clone_mnt+0x6c/0xce0 [ 1681.847772] copy_tree+0x3b0/0xa60 [ 1681.848429] copy_mnt_ns+0x144/0xa00 [ 1681.849092] ? kmem_cache_alloc+0x2a6/0x310 [ 1681.849861] create_new_namespaces+0xd6/0xb20 [ 1681.850658] copy_namespaces+0x3fb/0x4f0 [ 1681.851377] copy_process+0x385b/0x7800 [ 1681.852081] ? __lockdep_reset_lock+0x180/0x180 [ 1681.852944] ? __cleanup_sighand+0xb0/0xb0 [ 1681.853688] ? should_fail+0x76/0x5a0 [ 1681.854372] ? _copy_from_user+0xfb/0x1b0 [ 1681.855112] kernel_clone+0xe7/0x980 [ 1681.855772] ? create_io_thread+0xf0/0xf0 [ 1681.856509] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1681.857452] ? trace_hardirqs_on+0x5b/0x180 [ 1681.858213] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1681.859172] ? __do_sys_clone3+0xaa/0x320 [ 1681.859898] ? __do_sys_clone3+0x10f/0x320 [ 1681.860654] __do_sys_clone3+0x1e5/0x320 [ 1681.861369] ? __do_sys_clone+0x110/0x110 [ 1681.862098] ? recalibrate_cpu_khz+0x10/0x10 [ 1681.862891] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1681.863807] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1681.864755] ? trace_hardirqs_on+0x5b/0x180 [ 1681.865513] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1681.866476] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1681.867379] ? syscall_enter_from_user_mode+0x27/0x50 [ 1681.868290] do_syscall_64+0x33/0x40 [ 1681.868952] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1681.869847] RIP: 0033:0x7f33add2bb19 [ 1681.870502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1681.873700] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1681.875029] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1681.876273] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1681.877522] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1681.878763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1681.880006] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:30:22 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffcf2, &(0x7f0000000240)={&(0x7f0000000400)={0x14, 0x42, 0xe21}, 0x14}}, 0x40000) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:22 executing program 7: epoll_create(0x7ffd) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) 05:30:22 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:30:22 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:22 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:22 executing program 7: epoll_create(0x7ffd) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) 05:30:22 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 78) 05:30:22 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1682.177735] FAULT_INJECTION: forcing a failure. [ 1682.177735] name failslab, interval 1, probability 0, space 0, times 0 [ 1682.180348] CPU: 0 PID: 11137 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1682.181587] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1682.183056] Call Trace: [ 1682.183541] dump_stack+0x107/0x167 [ 1682.184207] should_fail.cold+0x5/0xa [ 1682.184902] ? alloc_vfsmnt+0x23/0x680 [ 1682.185606] should_failslab+0x5/0x20 [ 1682.186281] kmem_cache_alloc+0x5b/0x310 [ 1682.187021] ? copy_tree+0x61a/0xa60 [ 1682.187701] alloc_vfsmnt+0x23/0x680 [ 1682.188352] clone_mnt+0x6c/0xce0 [ 1682.189009] copy_tree+0x3b0/0xa60 [ 1682.189649] copy_mnt_ns+0x144/0xa00 [ 1682.190316] ? kmem_cache_alloc+0x2a6/0x310 [ 1682.191082] create_new_namespaces+0xd6/0xb20 [ 1682.191894] copy_namespaces+0x3fb/0x4f0 [ 1682.192610] copy_process+0x385b/0x7800 [ 1682.193326] ? __lockdep_reset_lock+0x180/0x180 [ 1682.194158] ? mark_lock+0xf5/0x2df0 [ 1682.194832] ? lock_acquire+0x197/0x470 [ 1682.195568] ? __cleanup_sighand+0xb0/0xb0 [ 1682.196353] ? _copy_from_user+0xfb/0x1b0 [ 1682.197108] kernel_clone+0xe7/0x980 [ 1682.197776] ? __lockdep_reset_lock+0x180/0x180 [ 1682.198607] ? create_io_thread+0xf0/0xf0 [ 1682.199379] ? ksys_write+0x21a/0x260 [ 1682.200058] ? lock_downgrade+0x6d0/0x6d0 [ 1682.200807] __do_sys_clone3+0x1e5/0x320 [ 1682.201541] ? __do_sys_clone+0x110/0x110 [ 1682.202312] ? rcu_read_lock_any_held+0x75/0xa0 [ 1682.203134] ? vfs_write+0x354/0xa70 [ 1682.203818] ? fput_many+0x2f/0x1a0 [ 1682.204485] ? ksys_write+0x1a9/0x260 [ 1682.205164] ? __ia32_sys_read+0xb0/0xb0 [ 1682.205903] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1682.206840] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1682.207752] ? trace_hardirqs_on+0x5b/0x180 [ 1682.208524] do_syscall_64+0x33/0x40 [ 1682.209188] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1682.210070] RIP: 0033:0x7f33add2bb19 [ 1682.210739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1682.214005] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1682.215369] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1682.216634] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1682.217907] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1682.219172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1682.220457] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:30:40 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df5"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:30:40 executing program 7: epoll_create(0x7ffd) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) 05:30:40 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:30:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:30:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x9, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:30:40 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:30:40 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 79) [ 1699.682644] FAULT_INJECTION: forcing a failure. [ 1699.682644] name failslab, interval 1, probability 0, space 0, times 0 [ 1699.684721] CPU: 1 PID: 11160 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1699.685780] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1699.687052] Call Trace: [ 1699.687468] dump_stack+0x107/0x167 [ 1699.688044] should_fail.cold+0x5/0xa [ 1699.688657] should_failslab+0x5/0x20 [ 1699.689261] __kmalloc_track_caller+0x79/0x370 [ 1699.689957] ? kstrdup_const+0x53/0x80 [ 1699.690578] kstrdup+0x36/0x70 [ 1699.691075] kstrdup_const+0x53/0x80 [ 1699.691656] alloc_vfsmnt+0xb5/0x680 [ 1699.692243] clone_mnt+0x6c/0xce0 [ 1699.692812] copy_tree+0x3b0/0xa60 [ 1699.693396] copy_mnt_ns+0x144/0xa00 [ 1699.693987] ? kmem_cache_alloc+0x2a6/0x310 [ 1699.694686] create_new_namespaces+0xd6/0xb20 [ 1699.695401] copy_namespaces+0x3fb/0x4f0 [ 1699.696043] copy_process+0x385b/0x7800 [ 1699.696671] ? __lockdep_reset_lock+0x180/0x180 [ 1699.697406] ? mark_lock+0xf5/0x2df0 [ 1699.697999] ? lock_acquire+0x197/0x470 [ 1699.698647] ? __cleanup_sighand+0xb0/0xb0 [ 1699.699323] ? _copy_from_user+0xfb/0x1b0 [ 1699.699982] kernel_clone+0xe7/0x980 [ 1699.700570] ? __lockdep_reset_lock+0x180/0x180 [ 1699.701309] ? create_io_thread+0xf0/0xf0 [ 1699.701970] ? ksys_write+0x21a/0x260 [ 1699.702566] ? lock_downgrade+0x6d0/0x6d0 [ 1699.703213] __do_sys_clone3+0x1e5/0x320 [ 1699.703835] ? __do_sys_clone+0x110/0x110 [ 1699.704501] ? rcu_read_lock_any_held+0x75/0xa0 [ 1699.705219] ? vfs_write+0x354/0xa70 [ 1699.705792] ? fput_many+0x2f/0x1a0 [ 1699.706357] ? ksys_write+0x1a9/0x260 [ 1699.706946] ? __ia32_sys_read+0xb0/0xb0 [ 1699.707569] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1699.708380] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1699.709182] ? trace_hardirqs_on+0x5b/0x180 [ 1699.709858] do_syscall_64+0x33/0x40 [ 1699.710436] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1699.711229] RIP: 0033:0x7f33add2bb19 [ 1699.711799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1699.714575] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1699.715739] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1699.716830] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1699.717913] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1699.718996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1699.720080] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:30:40 executing program 7: r0 = epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 05:30:40 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:40 executing program 7: r0 = epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 05:30:40 executing program 4: lseek(0xffffffffffffffff, 0x8, 0x3) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:40 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:30:40 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 80) 05:30:40 executing program 7: r0 = epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 05:30:40 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) [ 1700.134310] FAULT_INJECTION: forcing a failure. [ 1700.134310] name failslab, interval 1, probability 0, space 0, times 0 [ 1700.136395] CPU: 0 PID: 11180 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1700.137552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1700.138882] Call Trace: [ 1700.139315] dump_stack+0x107/0x167 [ 1700.139924] should_fail.cold+0x5/0xa [ 1700.140559] ? create_object.isra.0+0x3a/0xa20 [ 1700.141332] should_failslab+0x5/0x20 [ 1700.141967] kmem_cache_alloc+0x5b/0x310 [ 1700.142660] create_object.isra.0+0x3a/0xa20 [ 1700.143385] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1700.144220] __kmalloc_track_caller+0x177/0x370 [ 1700.145007] ? kstrdup_const+0x53/0x80 [ 1700.145663] kstrdup+0x36/0x70 [ 1700.146199] kstrdup_const+0x53/0x80 [ 1700.146816] alloc_vfsmnt+0xb5/0x680 [ 1700.147437] clone_mnt+0x6c/0xce0 [ 1700.148044] copy_tree+0x3b0/0xa60 [ 1700.148688] copy_mnt_ns+0x144/0xa00 [ 1700.149293] ? kmem_cache_alloc+0x2a6/0x310 [ 1700.150016] create_new_namespaces+0xd6/0xb20 [ 1700.150768] copy_namespaces+0x3fb/0x4f0 [ 1700.151426] copy_process+0x385b/0x7800 [ 1700.152090] ? __lockdep_reset_lock+0x180/0x180 [ 1700.152873] ? mark_lock+0xf5/0x2df0 [ 1700.153494] ? lock_acquire+0x197/0x470 [ 1700.154181] ? __cleanup_sighand+0xb0/0xb0 [ 1700.154899] ? _copy_from_user+0xfb/0x1b0 [ 1700.155605] kernel_clone+0xe7/0x980 [ 1700.156220] ? __lockdep_reset_lock+0x180/0x180 [ 1700.157012] ? create_io_thread+0xf0/0xf0 [ 1700.157721] ? ksys_write+0x21a/0x260 [ 1700.158334] ? lock_downgrade+0x6d0/0x6d0 [ 1700.159021] __do_sys_clone3+0x1e5/0x320 [ 1700.159691] ? __do_sys_clone+0x110/0x110 [ 1700.160402] ? rcu_read_lock_any_held+0x75/0xa0 [ 1700.161193] ? vfs_write+0x354/0xa70 [ 1700.161813] ? fput_many+0x2f/0x1a0 [ 1700.162419] ? ksys_write+0x1a9/0x260 [ 1700.163051] ? __ia32_sys_read+0xb0/0xb0 [ 1700.163725] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1700.164591] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1700.165438] ? trace_hardirqs_on+0x5b/0x180 [ 1700.166180] do_syscall_64+0x33/0x40 [ 1700.166806] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1700.167839] RIP: 0033:0x7f33add2bb19 [ 1700.168632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1700.171967] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1700.173238] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1700.174410] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1700.175590] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.176786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1700.177939] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:30:40 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) 05:30:40 executing program 4: r0 = epoll_create(0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:40 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df5"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:30:55 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 81) 05:30:55 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:30:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(0x0, 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:30:55 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) 05:30:55 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:30:55 executing program 4: r0 = epoll_create(0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:55 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df5"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:30:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:30:55 executing program 4: r0 = epoll_create(0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) [ 1715.048834] FAULT_INJECTION: forcing a failure. [ 1715.048834] name failslab, interval 1, probability 0, space 0, times 0 [ 1715.051270] CPU: 0 PID: 11212 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1715.052361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1715.053699] Call Trace: [ 1715.054130] dump_stack+0x107/0x167 [ 1715.054724] should_fail.cold+0x5/0xa [ 1715.055342] ? create_object.isra.0+0x3a/0xa20 [ 1715.056091] should_failslab+0x5/0x20 [ 1715.056709] kmem_cache_alloc+0x5b/0x310 [ 1715.057372] create_object.isra.0+0x3a/0xa20 [ 1715.058092] kmemleak_alloc_percpu+0xa0/0x100 [ 1715.058829] pcpu_alloc+0x4e2/0x1240 [ 1715.059454] alloc_vfsmnt+0xfd/0x680 [ 1715.060064] clone_mnt+0x6c/0xce0 [ 1715.060638] copy_tree+0x3b0/0xa60 [ 1715.061250] copy_mnt_ns+0x144/0xa00 [ 1715.061858] ? kmem_cache_alloc+0x2a6/0x310 [ 1715.062563] create_new_namespaces+0xd6/0xb20 [ 1715.063298] copy_namespaces+0x3fb/0x4f0 [ 1715.063963] copy_process+0x385b/0x7800 [ 1715.064612] ? __lockdep_reset_lock+0x180/0x180 [ 1715.065368] ? mark_lock+0xf5/0x2df0 [ 1715.065981] ? lock_acquire+0x197/0x470 [ 1715.066646] ? __cleanup_sighand+0xb0/0xb0 [ 1715.067346] ? _copy_from_user+0xfb/0x1b0 [ 1715.068029] kernel_clone+0xe7/0x980 [ 1715.068630] ? __lockdep_reset_lock+0x180/0x180 [ 1715.069535] ? create_io_thread+0xf0/0xf0 [ 1715.070324] ? ksys_write+0x21a/0x260 [ 1715.071034] ? lock_downgrade+0x6d0/0x6d0 [ 1715.071812] __do_sys_clone3+0x1e5/0x320 [ 1715.072569] ? __do_sys_clone+0x110/0x110 [ 1715.073374] ? rcu_read_lock_any_held+0x75/0xa0 [ 1715.074241] ? vfs_write+0x354/0xa70 [ 1715.074944] ? fput_many+0x2f/0x1a0 [ 1715.075628] ? ksys_write+0x1a9/0x260 [ 1715.076341] ? __ia32_sys_read+0xb0/0xb0 [ 1715.077116] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1715.078099] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1715.079057] ? trace_hardirqs_on+0x5b/0x180 [ 1715.079868] do_syscall_64+0x33/0x40 [ 1715.080565] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1715.081522] RIP: 0033:0x7f33add2bb19 [ 1715.082218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1715.085621] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1715.087032] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1715.088361] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1715.089680] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1715.090988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1715.092343] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:30:55 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:30:55 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) 05:30:55 executing program 4: epoll_create(0x7ffd) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) 05:31:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(0x0, 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:12 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:31:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x30, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:31:12 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 82) 05:31:12 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b36"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:31:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:12 executing program 4: epoll_create(0x7ffd) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) [ 1731.823515] FAULT_INJECTION: forcing a failure. [ 1731.823515] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.825121] CPU: 1 PID: 11240 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1731.825921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.826878] Call Trace: [ 1731.827197] dump_stack+0x107/0x167 [ 1731.827628] should_fail.cold+0x5/0xa [ 1731.828078] ? create_object.isra.0+0x3a/0xa20 [ 1731.828611] should_failslab+0x5/0x20 [ 1731.829065] kmem_cache_alloc+0x5b/0x310 [ 1731.829533] ? mark_held_locks+0x9e/0xe0 [ 1731.830005] create_object.isra.0+0x3a/0xa20 [ 1731.830528] kmemleak_alloc_percpu+0xa0/0x100 [ 1731.831050] pcpu_alloc+0x4e2/0x1240 [ 1731.831506] alloc_vfsmnt+0xfd/0x680 [ 1731.831942] clone_mnt+0x6c/0xce0 [ 1731.832361] copy_tree+0x3b0/0xa60 [ 1731.832794] copy_mnt_ns+0x144/0xa00 [ 1731.833239] ? kmem_cache_alloc+0x2a6/0x310 [ 1731.833749] create_new_namespaces+0xd6/0xb20 [ 1731.834280] copy_namespaces+0x3fb/0x4f0 [ 1731.834757] copy_process+0x385b/0x7800 [ 1731.835210] ? __lockdep_reset_lock+0x180/0x180 [ 1731.835750] ? mark_lock+0xf5/0x2df0 [ 1731.836188] ? lock_acquire+0x197/0x470 [ 1731.836670] ? __cleanup_sighand+0xb0/0xb0 [ 1731.837188] ? _copy_from_user+0xfb/0x1b0 [ 1731.837677] kernel_clone+0xe7/0x980 [ 1731.838107] ? __lockdep_reset_lock+0x180/0x180 [ 1731.838643] ? create_io_thread+0xf0/0xf0 [ 1731.839134] ? ksys_write+0x21a/0x260 [ 1731.839572] ? lock_downgrade+0x6d0/0x6d0 [ 1731.840053] __do_sys_clone3+0x1e5/0x320 [ 1731.840519] ? __do_sys_clone+0x110/0x110 [ 1731.841021] ? rcu_read_lock_any_held+0x75/0xa0 [ 1731.841542] ? vfs_write+0x354/0xa70 [ 1731.841969] ? fput_many+0x2f/0x1a0 [ 1731.842388] ? ksys_write+0x1a9/0x260 [ 1731.842825] ? __ia32_sys_read+0xb0/0xb0 [ 1731.843296] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.843886] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.844471] ? trace_hardirqs_on+0x5b/0x180 [ 1731.844981] do_syscall_64+0x33/0x40 [ 1731.845418] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1731.845996] RIP: 0033:0x7f33add2bb19 [ 1731.846436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.848492] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1731.849369] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1731.850175] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1731.850975] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1731.851781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1731.852583] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:31:12 executing program 4: epoll_create(0x7ffd) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) 05:31:12 executing program 4: r0 = epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 05:31:12 executing program 4: r0 = epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 05:31:12 executing program 4: r0 = epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 05:31:12 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 83) 05:31:12 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b36"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1732.193168] FAULT_INJECTION: forcing a failure. [ 1732.193168] name failslab, interval 1, probability 0, space 0, times 0 [ 1732.194509] CPU: 1 PID: 11263 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1732.195149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1732.195908] Call Trace: [ 1732.196174] dump_stack+0x107/0x167 [ 1732.196527] should_fail.cold+0x5/0xa [ 1732.196890] ? alloc_vfsmnt+0x23/0x680 [ 1732.197266] should_failslab+0x5/0x20 [ 1732.197624] kmem_cache_alloc+0x5b/0x310 [ 1732.198008] ? copy_tree+0x61a/0xa60 [ 1732.198367] alloc_vfsmnt+0x23/0x680 [ 1732.198725] clone_mnt+0x6c/0xce0 [ 1732.199058] copy_tree+0x3b0/0xa60 [ 1732.199405] copy_mnt_ns+0x144/0xa00 [ 1732.199756] ? kmem_cache_alloc+0x2a6/0x310 [ 1732.200167] create_new_namespaces+0xd6/0xb20 [ 1732.200591] copy_namespaces+0x3fb/0x4f0 [ 1732.200983] copy_process+0x385b/0x7800 [ 1732.201354] ? __lockdep_reset_lock+0x180/0x180 [ 1732.201783] ? mark_lock+0xf5/0x2df0 [ 1732.202133] ? lock_acquire+0x197/0x470 [ 1732.202515] ? __cleanup_sighand+0xb0/0xb0 [ 1732.202917] ? _copy_from_user+0xfb/0x1b0 [ 1732.203305] kernel_clone+0xe7/0x980 [ 1732.203653] ? __lockdep_reset_lock+0x180/0x180 [ 1732.204085] ? create_io_thread+0xf0/0xf0 [ 1732.204483] ? ksys_write+0x21a/0x260 [ 1732.204832] ? lock_downgrade+0x6d0/0x6d0 [ 1732.205221] __do_sys_clone3+0x1e5/0x320 [ 1732.205597] ? __do_sys_clone+0x110/0x110 [ 1732.205996] ? rcu_read_lock_any_held+0x75/0xa0 [ 1732.206418] ? vfs_write+0x354/0xa70 [ 1732.206765] ? fput_many+0x2f/0x1a0 [ 1732.207100] ? ksys_write+0x1a9/0x260 [ 1732.207449] ? __ia32_sys_read+0xb0/0xb0 [ 1732.207826] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1732.208308] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1732.208778] ? trace_hardirqs_on+0x5b/0x180 [ 1732.209189] do_syscall_64+0x33/0x40 [ 1732.209534] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1732.210003] RIP: 0033:0x7f33add2bb19 [ 1732.210347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1732.212022] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1732.212716] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1732.213376] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1732.214020] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1732.214669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1732.215312] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:31:12 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) 05:31:12 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) 05:31:12 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:31:29 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) 05:31:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x31, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:31:29 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 84) 05:31:29 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) 05:31:29 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b36"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:31:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(0x0, 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1748.679317] FAULT_INJECTION: forcing a failure. [ 1748.679317] name failslab, interval 1, probability 0, space 0, times 0 [ 1748.681412] CPU: 1 PID: 11293 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1748.682518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1748.683836] Call Trace: [ 1748.684270] dump_stack+0x107/0x167 [ 1748.684863] should_fail.cold+0x5/0xa [ 1748.685489] ? create_object.isra.0+0x3a/0xa20 [ 1748.686213] should_failslab+0x5/0x20 [ 1748.686815] kmem_cache_alloc+0x5b/0x310 [ 1748.687462] ? __lockdep_reset_lock+0x180/0x180 [ 1748.688212] create_object.isra.0+0x3a/0xa20 [ 1748.688911] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1748.689742] kmem_cache_alloc+0x159/0x310 [ 1748.690424] alloc_vfsmnt+0x23/0x680 [ 1748.691030] clone_mnt+0x6c/0xce0 [ 1748.691597] copy_tree+0x3b0/0xa60 [ 1748.692196] copy_mnt_ns+0x144/0xa00 [ 1748.692792] ? kmem_cache_alloc+0x2a6/0x310 [ 1748.693498] create_new_namespaces+0xd6/0xb20 [ 1748.694231] copy_namespaces+0x3fb/0x4f0 [ 1748.694880] copy_process+0x385b/0x7800 [ 1748.695519] ? __lockdep_reset_lock+0x180/0x180 [ 1748.696260] ? mark_lock+0xf5/0x2df0 [ 1748.696865] ? lock_acquire+0x197/0x470 [ 1748.697530] ? __cleanup_sighand+0xb0/0xb0 [ 1748.698232] ? _copy_from_user+0xfb/0x1b0 [ 1748.698899] kernel_clone+0xe7/0x980 [ 1748.699499] ? __lockdep_reset_lock+0x180/0x180 [ 1748.700247] ? create_io_thread+0xf0/0xf0 [ 1748.700933] ? ksys_write+0x21a/0x260 [ 1748.701550] ? lock_downgrade+0x6d0/0x6d0 [ 1748.702219] __do_sys_clone3+0x1e5/0x320 [ 1748.702873] ? __do_sys_clone+0x110/0x110 [ 1748.703566] ? rcu_read_lock_any_held+0x75/0xa0 [ 1748.704306] ? vfs_write+0x354/0xa70 [ 1748.704904] ? fput_many+0x2f/0x1a0 [ 1748.705494] ? ksys_write+0x1a9/0x260 [ 1748.706113] ? __ia32_sys_read+0xb0/0xb0 [ 1748.706781] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1748.707620] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1748.708444] ? trace_hardirqs_on+0x5b/0x180 [ 1748.709136] do_syscall_64+0x33/0x40 [ 1748.709736] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1748.710555] RIP: 0033:0x7f33add2bb19 [ 1748.711159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1748.714064] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1748.715270] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1748.716395] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1748.717537] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1748.718660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1748.719795] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:31:29 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) 05:31:29 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df5"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:31:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:29 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) 05:31:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:29 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:31:29 executing program 7: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df5"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:31:29 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369e"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:31:29 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 85) [ 1749.327376] FAULT_INJECTION: forcing a failure. [ 1749.327376] name failslab, interval 1, probability 0, space 0, times 0 [ 1749.329392] CPU: 0 PID: 11319 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1749.330434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1749.331673] Call Trace: [ 1749.332089] dump_stack+0x107/0x167 [ 1749.332651] should_fail.cold+0x5/0xa [ 1749.333252] should_failslab+0x5/0x20 [ 1749.333835] __kmalloc_track_caller+0x79/0x370 [ 1749.334526] ? kstrdup_const+0x53/0x80 [ 1749.335128] kstrdup+0x36/0x70 [ 1749.335626] kstrdup_const+0x53/0x80 [ 1749.336214] alloc_vfsmnt+0xb5/0x680 [ 1749.336799] clone_mnt+0x6c/0xce0 [ 1749.337360] copy_tree+0x3b0/0xa60 [ 1749.337922] copy_mnt_ns+0x144/0xa00 [ 1749.338496] ? kmem_cache_alloc+0x2a6/0x310 [ 1749.339153] create_new_namespaces+0xd6/0xb20 [ 1749.339842] copy_namespaces+0x3fb/0x4f0 [ 1749.340455] copy_process+0x385b/0x7800 [ 1749.341062] ? __lockdep_reset_lock+0x180/0x180 [ 1749.341786] ? mark_lock+0xf5/0x2df0 [ 1749.342354] ? lock_acquire+0x197/0x470 [ 1749.342972] ? __cleanup_sighand+0xb0/0xb0 [ 1749.343623] ? _copy_from_user+0xfb/0x1b0 [ 1749.344257] kernel_clone+0xe7/0x980 [ 1749.344833] ? __lockdep_reset_lock+0x180/0x180 [ 1749.345545] ? create_io_thread+0xf0/0xf0 [ 1749.346227] ? ksys_write+0x21a/0x260 [ 1749.346815] ? lock_downgrade+0x6d0/0x6d0 [ 1749.347463] __do_sys_clone3+0x1e5/0x320 [ 1749.348091] ? __do_sys_clone+0x110/0x110 [ 1749.348754] ? rcu_read_lock_any_held+0x75/0xa0 [ 1749.349473] ? vfs_write+0x354/0xa70 [ 1749.350053] ? fput_many+0x2f/0x1a0 [ 1749.350633] ? ksys_write+0x1a9/0x260 [ 1749.351237] ? __ia32_sys_read+0xb0/0xb0 [ 1749.351867] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1749.352672] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1749.353471] ? trace_hardirqs_on+0x5b/0x180 [ 1749.354144] do_syscall_64+0x33/0x40 [ 1749.354719] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1749.355511] RIP: 0033:0x7f33add2bb19 [ 1749.356099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1749.358908] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1749.360072] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1749.361161] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1749.362258] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1749.363341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1749.364426] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:31:47 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 86) 05:31:47 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:31:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:47 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:31:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x60, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:31:47 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369e"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1767.395318] FAULT_INJECTION: forcing a failure. [ 1767.395318] name failslab, interval 1, probability 0, space 0, times 0 [ 1767.397089] CPU: 1 PID: 11341 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1767.398069] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1767.399195] Call Trace: [ 1767.399565] dump_stack+0x107/0x167 [ 1767.400076] should_fail.cold+0x5/0xa [ 1767.400606] ? create_object.isra.0+0x3a/0xa20 [ 1767.401234] should_failslab+0x5/0x20 [ 1767.401786] kmem_cache_alloc+0x5b/0x310 [ 1767.402354] create_object.isra.0+0x3a/0xa20 [ 1767.402956] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1767.403653] __kmalloc_track_caller+0x177/0x370 [ 1767.404295] ? kstrdup_const+0x53/0x80 [ 1767.404835] kstrdup+0x36/0x70 [ 1767.405293] kstrdup_const+0x53/0x80 [ 1767.405839] alloc_vfsmnt+0xb5/0x680 [ 1767.406355] clone_mnt+0x6c/0xce0 [ 1767.406839] copy_tree+0x3b0/0xa60 [ 1767.407347] copy_mnt_ns+0x144/0xa00 [ 1767.407860] ? kmem_cache_alloc+0x2a6/0x310 [ 1767.408466] create_new_namespaces+0xd6/0xb20 [ 1767.409094] copy_namespaces+0x3fb/0x4f0 [ 1767.409682] copy_process+0x385b/0x7800 [ 1767.410233] ? __lockdep_reset_lock+0x180/0x180 [ 1767.410870] ? mark_lock+0xf5/0x2df0 [ 1767.411396] ? lock_acquire+0x197/0x470 [ 1767.411963] ? __cleanup_sighand+0xb0/0xb0 [ 1767.412558] ? _copy_from_user+0xfb/0x1b0 [ 1767.413142] kernel_clone+0xe7/0x980 [ 1767.413678] ? __lockdep_reset_lock+0x180/0x180 [ 1767.414314] ? create_io_thread+0xf0/0xf0 [ 1767.414896] ? ksys_write+0x21a/0x260 [ 1767.415425] ? lock_downgrade+0x6d0/0x6d0 [ 1767.415998] __do_sys_clone3+0x1e5/0x320 [ 1767.416561] ? __do_sys_clone+0x110/0x110 [ 1767.417157] ? rcu_read_lock_any_held+0x75/0xa0 [ 1767.417748] ? vfs_write+0x354/0xa70 [ 1767.418180] ? fput_many+0x2f/0x1a0 [ 1767.418605] ? ksys_write+0x1a9/0x260 [ 1767.419065] ? __ia32_sys_read+0xb0/0xb0 [ 1767.419536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1767.420149] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1767.420738] ? trace_hardirqs_on+0x5b/0x180 [ 1767.421248] do_syscall_64+0x33/0x40 [ 1767.421695] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1767.422279] RIP: 0033:0x7f33add2bb19 [ 1767.422710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1767.424817] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1767.425718] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1767.426532] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1767.427355] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1767.428185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1767.428996] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:31:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:47 executing program 7: lseek(0xffffffffffffffff, 0x8, 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fb2a0305e90a7707000000d225f974ca0100d1c09f0d9ee601aec55cff9112ef2d82c109005c738a2ab08fbce3fff101f2d5387ebda093e9253fed9498a52c173fbc82933c64199c4ea14458f7d6da788d0b59e7b08f0f"], 0x2a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:31:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:48 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:48 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:31:48 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 1) 05:31:48 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:31:48 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 87) [ 1767.882374] FAULT_INJECTION: forcing a failure. [ 1767.882374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1767.883418] CPU: 1 PID: 11365 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1767.884001] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1767.884712] Call Trace: [ 1767.884947] dump_stack+0x107/0x167 [ 1767.885273] should_fail.cold+0x5/0xa [ 1767.885622] _copy_from_user+0x2e/0x1b0 [ 1767.885967] __x64_sys_epoll_ctl+0x114/0x1c0 [ 1767.886348] ? do_epoll_ctl+0x2c00/0x2c00 [ 1767.886714] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1767.887161] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1767.887599] do_syscall_64+0x33/0x40 [ 1767.887917] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1767.888354] RIP: 0033:0x7f0e28ca6b19 [ 1767.888681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1767.890258] RSP: 002b:00007f0e2621c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1767.890903] RAX: ffffffffffffffda RBX: 00007f0e28db9f60 RCX: 00007f0e28ca6b19 [ 1767.891506] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1767.892113] RBP: 00007f0e2621c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1767.892710] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1767.893313] R13: 00007ffdf47aca2f R14: 00007f0e2621c300 R15: 0000000000022000 05:31:48 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 2) [ 1768.004852] FAULT_INJECTION: forcing a failure. [ 1768.004852] name failslab, interval 1, probability 0, space 0, times 0 [ 1768.007277] CPU: 0 PID: 11371 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1768.008403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1768.009777] Call Trace: [ 1768.010239] dump_stack+0x107/0x167 [ 1768.010874] should_fail.cold+0x5/0xa [ 1768.011535] ? create_object.isra.0+0x3a/0xa20 [ 1768.012311] should_failslab+0x5/0x20 [ 1768.012961] kmem_cache_alloc+0x5b/0x310 [ 1768.013665] create_object.isra.0+0x3a/0xa20 [ 1768.014415] kmemleak_alloc_percpu+0xa0/0x100 [ 1768.015182] pcpu_alloc+0x4e2/0x1240 [ 1768.015843] alloc_vfsmnt+0xfd/0x680 [ 1768.016445] clone_mnt+0x6c/0xce0 [ 1768.017043] copy_tree+0x3b0/0xa60 [ 1768.017683] copy_mnt_ns+0x144/0xa00 [ 1768.018326] ? kmem_cache_alloc+0x2a6/0x310 [ 1768.019083] create_new_namespaces+0xd6/0xb20 [ 1768.019867] copy_namespaces+0x3fb/0x4f0 [ 1768.020537] copy_process+0x385b/0x7800 [ 1768.021236] ? __lockdep_reset_lock+0x180/0x180 [ 1768.022002] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1768.022846] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1768.023716] ? lock_acquire+0x197/0x470 [ 1768.024378] ? __cleanup_sighand+0xb0/0xb0 [ 1768.025077] ? _copy_from_user+0xfb/0x1b0 [ 1768.025762] kernel_clone+0xe7/0x980 [ 1768.026258] FAULT_INJECTION: forcing a failure. [ 1768.026258] name failslab, interval 1, probability 0, space 0, times 0 [ 1768.028081] ? __lockdep_reset_lock+0x180/0x180 [ 1768.028829] ? create_io_thread+0xf0/0xf0 [ 1768.029519] ? ksys_write+0x21a/0x260 [ 1768.030135] ? lock_downgrade+0x6d0/0x6d0 [ 1768.030803] __do_sys_clone3+0x1e5/0x320 [ 1768.031453] ? __do_sys_clone+0x110/0x110 [ 1768.032138] ? rcu_read_lock_any_held+0x75/0xa0 [ 1768.032873] ? vfs_write+0x354/0xa70 [ 1768.033482] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1768.034220] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1768.035082] ? ksys_write+0x1a9/0x260 [ 1768.035690] ? __ia32_sys_read+0xb0/0xb0 [ 1768.036342] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1768.037175] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1768.038016] ? trace_hardirqs_on+0x5b/0x180 [ 1768.038730] do_syscall_64+0x33/0x40 [ 1768.039337] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1768.040168] RIP: 0033:0x7f33add2bb19 [ 1768.040774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1768.043743] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1768.044984] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1768.046151] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1768.047303] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1768.048449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1768.049606] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 [ 1768.050785] CPU: 1 PID: 11373 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1768.051821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1768.052486] Call Trace: [ 1768.052706] dump_stack+0x107/0x167 [ 1768.053007] should_fail.cold+0x5/0xa [ 1768.053316] ? do_epoll_ctl+0xba2/0x2c00 [ 1768.053668] should_failslab+0x5/0x20 [ 1768.053982] kmem_cache_alloc+0x5b/0x310 [ 1768.054309] do_epoll_ctl+0xba2/0x2c00 [ 1768.054637] ? __might_fault+0xd3/0x180 [ 1768.054967] ? lock_downgrade+0x6d0/0x6d0 [ 1768.055302] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1768.055724] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1768.056084] ? do_epoll_ctl+0x2c00/0x2c00 [ 1768.056424] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1768.056843] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1768.057272] do_syscall_64+0x33/0x40 [ 1768.057581] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1768.057993] RIP: 0033:0x7f0e28ca6b19 [ 1768.058296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1768.059790] RSP: 002b:00007f0e2621c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1768.060421] RAX: ffffffffffffffda RBX: 00007f0e28db9f60 RCX: 00007f0e28ca6b19 [ 1768.060998] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1768.061593] RBP: 00007f0e2621c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1768.062179] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1768.062746] R13: 00007ffdf47aca2f R14: 00007f0e2621c300 R15: 0000000000022000 05:31:48 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369e"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:31:48 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:32:04 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 3) [ 1783.757648] FAULT_INJECTION: forcing a failure. [ 1783.757648] name failslab, interval 1, probability 0, space 0, times 0 [ 1783.759393] CPU: 1 PID: 11388 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1783.760438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1783.761649] Call Trace: [ 1783.762042] dump_stack+0x107/0x167 [ 1783.762592] should_fail.cold+0x5/0xa [ 1783.763159] ? create_object.isra.0+0x3a/0xa20 [ 1783.763830] should_failslab+0x5/0x20 [ 1783.764390] kmem_cache_alloc+0x5b/0x310 [ 1783.764995] create_object.isra.0+0x3a/0xa20 [ 1783.765646] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1783.766394] kmem_cache_alloc+0x159/0x310 [ 1783.767009] do_epoll_ctl+0xba2/0x2c00 [ 1783.767596] ? __might_fault+0xd3/0x180 [ 1783.768185] ? lock_downgrade+0x6d0/0x6d0 [ 1783.768796] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1783.769542] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1783.770195] ? do_epoll_ctl+0x2c00/0x2c00 [ 1783.770808] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1783.771571] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1783.772334] do_syscall_64+0x33/0x40 [ 1783.772884] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1783.773668] RIP: 0033:0x7f0e28ca6b19 [ 1783.774210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1783.776927] RSP: 002b:00007f0e2621c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1783.778036] RAX: ffffffffffffffda RBX: 00007f0e28db9f60 RCX: 00007f0e28ca6b19 [ 1783.779104] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1783.780174] RBP: 00007f0e2621c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1783.781247] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1783.782320] R13: 00007ffdf47aca2f R14: 00007f0e2621c300 R15: 0000000000022000 [ 1783.784832] FAULT_INJECTION: forcing a failure. [ 1783.784832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1783.787190] CPU: 0 PID: 11391 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1783.788530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1783.790151] Call Trace: [ 1783.790671] dump_stack+0x107/0x167 [ 1783.791392] should_fail.cold+0x5/0xa [ 1783.792148] _copy_from_user+0x2e/0x1b0 [ 1783.792937] __x64_sys_epoll_ctl+0x114/0x1c0 [ 1783.793807] ? do_epoll_ctl+0x2c00/0x2c00 [ 1783.794628] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1783.795629] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1783.796651] do_syscall_64+0x33/0x40 [ 1783.797381] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1783.798377] RIP: 0033:0x7f493a2a6b19 [ 1783.799092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1783.802644] RSP: 002b:00007f493781c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1783.804093] RAX: ffffffffffffffda RBX: 00007f493a3b9f60 RCX: 00007f493a2a6b19 [ 1783.805454] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1783.806773] RBP: 00007f493781c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1783.807903] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1783.809040] R13: 00007ffe4239de8f R14: 00007f493781c300 R15: 0000000000022000 05:32:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1f4, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:32:04 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, 0x0) r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:32:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:32:04 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 88) 05:32:04 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 1) 05:32:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1783.861762] FAULT_INJECTION: forcing a failure. [ 1783.861762] name failslab, interval 1, probability 0, space 0, times 0 [ 1783.864107] CPU: 0 PID: 11400 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1783.865234] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1783.866620] Call Trace: [ 1783.867055] dump_stack+0x107/0x167 [ 1783.867651] should_fail.cold+0x5/0xa [ 1783.868272] ? create_object.isra.0+0x3a/0xa20 [ 1783.869038] should_failslab+0x5/0x20 [ 1783.869678] kmem_cache_alloc+0x5b/0x310 [ 1783.870356] ? mark_held_locks+0x9e/0xe0 [ 1783.871036] create_object.isra.0+0x3a/0xa20 [ 1783.871779] kmemleak_alloc_percpu+0xa0/0x100 [ 1783.872516] pcpu_alloc+0x4e2/0x1240 [ 1783.873144] alloc_vfsmnt+0xfd/0x680 [ 1783.873758] clone_mnt+0x6c/0xce0 [ 1783.874335] copy_tree+0x3b0/0xa60 [ 1783.874951] copy_mnt_ns+0x144/0xa00 [ 1783.875561] ? kmem_cache_alloc+0x2a6/0x310 [ 1783.876292] create_new_namespaces+0xd6/0xb20 [ 1783.877029] copy_namespaces+0x3fb/0x4f0 [ 1783.877701] copy_process+0x385b/0x7800 [ 1783.878348] ? __lockdep_reset_lock+0x180/0x180 [ 1783.879103] ? mark_lock+0xf5/0x2df0 [ 1783.879720] ? lock_acquire+0x197/0x470 [ 1783.880406] ? __cleanup_sighand+0xb0/0xb0 [ 1783.881131] ? _copy_from_user+0xfb/0x1b0 [ 1783.881821] kernel_clone+0xe7/0x980 [ 1783.882437] ? __lockdep_reset_lock+0x180/0x180 [ 1783.883216] ? create_io_thread+0xf0/0xf0 [ 1783.883904] ? ksys_write+0x21a/0x260 [ 1783.884521] ? lock_downgrade+0x6d0/0x6d0 [ 1783.885191] __do_sys_clone3+0x1e5/0x320 [ 1783.885867] ? __do_sys_clone+0x110/0x110 [ 1783.886579] ? rcu_read_lock_any_held+0x75/0xa0 [ 1783.887326] ? vfs_write+0x354/0xa70 [ 1783.887927] ? fput_many+0x2f/0x1a0 [ 1783.888518] ? ksys_write+0x1a9/0x260 [ 1783.889133] ? __ia32_sys_read+0xb0/0xb0 [ 1783.889799] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1783.890640] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1783.891464] ? trace_hardirqs_on+0x5b/0x180 [ 1783.892166] do_syscall_64+0x33/0x40 [ 1783.892770] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1783.893628] RIP: 0033:0x7f33add2bb19 [ 1783.894231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1783.897155] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1783.898384] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1783.899529] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1783.900680] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1783.901829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1783.902972] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:32:04 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 4) [ 1783.993648] FAULT_INJECTION: forcing a failure. [ 1783.993648] name failslab, interval 1, probability 0, space 0, times 0 [ 1783.995863] CPU: 1 PID: 11405 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1783.996870] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1783.998085] Call Trace: [ 1783.998481] dump_stack+0x107/0x167 [ 1783.999032] should_fail.cold+0x5/0xa [ 1783.999594] ? ep_ptable_queue_proc+0xa7/0x330 [ 1784.000275] should_failslab+0x5/0x20 [ 1784.000840] kmem_cache_alloc+0x5b/0x310 [ 1784.001439] ? SOFTIRQ_verbose+0x10/0x10 [ 1784.002060] ep_ptable_queue_proc+0xa7/0x330 [ 1784.002699] ? ep_show_fdinfo+0x380/0x380 [ 1784.003308] n_tty_poll+0x79/0x8f0 [ 1784.003830] ? n_tty_ioctl+0x370/0x370 [ 1784.004408] tty_poll+0x144/0x1c0 [ 1784.004925] ? tty_release+0xe90/0xe90 [ 1784.005490] ep_item_poll+0x14c/0x3f0 [ 1784.006058] ? do_raw_spin_lock+0x121/0x260 [ 1784.006692] ? ep_eventpoll_poll+0x170/0x170 [ 1784.007335] ? rwlock_bug.part.0+0x90/0x90 [ 1784.007966] do_epoll_ctl+0x1a14/0x2c00 [ 1784.008570] ? lock_downgrade+0x6d0/0x6d0 [ 1784.009200] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1784.009931] ? ep_show_fdinfo+0x380/0x380 [ 1784.010576] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1784.011219] ? do_epoll_ctl+0x2c00/0x2c00 [ 1784.011855] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1784.012652] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1784.013439] do_syscall_64+0x33/0x40 [ 1784.014007] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1784.014786] RIP: 0033:0x7f0e28ca6b19 [ 1784.015340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1784.018084] RSP: 002b:00007f0e2621c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1784.019209] RAX: ffffffffffffffda RBX: 00007f0e28db9f60 RCX: 00007f0e28ca6b19 [ 1784.020282] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1784.021351] RBP: 00007f0e2621c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1784.022431] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1784.023495] R13: 00007ffdf47aca2f R14: 00007f0e2621c300 R15: 0000000000022000 05:32:04 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 2) 05:32:04 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) [ 1784.076383] FAULT_INJECTION: forcing a failure. [ 1784.076383] name failslab, interval 1, probability 0, space 0, times 0 [ 1784.078173] CPU: 1 PID: 11409 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1784.079207] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1784.080439] Call Trace: [ 1784.080843] dump_stack+0x107/0x167 [ 1784.081405] should_fail.cold+0x5/0xa [ 1784.081973] ? do_epoll_ctl+0xba2/0x2c00 [ 1784.082588] should_failslab+0x5/0x20 [ 1784.083164] kmem_cache_alloc+0x5b/0x310 [ 1784.083779] do_epoll_ctl+0xba2/0x2c00 [ 1784.084391] ? __might_fault+0xd3/0x180 [ 1784.084978] ? lock_downgrade+0x6d0/0x6d0 [ 1784.085613] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1784.086363] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1784.087025] ? do_epoll_ctl+0x2c00/0x2c00 [ 1784.087631] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1784.088186] FAULT_INJECTION: forcing a failure. [ 1784.088186] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1784.088398] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1784.090992] do_syscall_64+0x33/0x40 [ 1784.091530] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1784.092300] RIP: 0033:0x7f493a2a6b19 [ 1784.092846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1784.095571] RSP: 002b:00007f493781c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1784.096687] RAX: ffffffffffffffda RBX: 00007f493a3b9f60 RCX: 00007f493a2a6b19 [ 1784.097719] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1784.098739] RBP: 00007f493781c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1784.099761] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1784.100813] R13: 00007ffe4239de8f R14: 00007f493781c300 R15: 0000000000022000 [ 1784.102050] CPU: 0 PID: 11408 Comm: syz-executor.1 Not tainted 5.10.209 #1 [ 1784.103205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1784.104574] Call Trace: [ 1784.105019] dump_stack+0x107/0x167 [ 1784.105642] should_fail.cold+0x5/0xa [ 1784.106290] _copy_from_user+0x2e/0x1b0 [ 1784.106962] copy_clone_args_from_user+0x147/0x790 [ 1784.107776] ? __lockdep_reset_lock+0x180/0x180 [ 1784.108537] ? sighand_ctor+0x40/0x40 [ 1784.109181] ? find_held_lock+0x2c/0x110 [ 1784.109864] ? ksys_write+0x21a/0x260 [ 1784.110503] ? lock_downgrade+0x6d0/0x6d0 [ 1784.111200] __do_sys_clone3+0x9d/0x320 [ 1784.111879] ? __do_sys_clone+0x110/0x110 [ 1784.112581] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1784.113371] ? wait_for_completion_io+0x270/0x270 [ 1784.114168] ? rcu_read_lock_any_held+0x75/0xa0 [ 1784.114913] ? vfs_write+0x354/0xa70 [ 1784.115544] ? fput_many+0x2f/0x1a0 [ 1784.116153] ? ksys_write+0x1a9/0x260 [ 1784.116768] ? __ia32_sys_read+0xb0/0xb0 [ 1784.117428] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1784.118273] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1784.119121] ? trace_hardirqs_on+0x5b/0x180 [ 1784.119822] do_syscall_64+0x33/0x40 [ 1784.120432] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1784.121265] RIP: 0033:0x7f15421c6b19 [ 1784.121873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1784.124849] RSP: 002b:00007f153f73c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1784.126083] RAX: ffffffffffffffda RBX: 00007f15422d9f60 RCX: 00007f15421c6b19 [ 1784.127262] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1784.128441] RBP: 00007f153f73c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1784.129622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1784.130803] R13: 00007fff7040d31f R14: 00007f153f73c300 R15: 0000000000022000 05:32:04 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 5) 05:32:04 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, 0x0) r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:32:04 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 3) [ 1784.308561] FAULT_INJECTION: forcing a failure. [ 1784.308561] name failslab, interval 1, probability 0, space 0, times 0 [ 1784.310491] CPU: 1 PID: 11413 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1784.311582] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1784.312883] Call Trace: [ 1784.313309] dump_stack+0x107/0x167 [ 1784.313897] should_fail.cold+0x5/0xa [ 1784.314491] ? create_object.isra.0+0x3a/0xa20 [ 1784.315210] should_failslab+0x5/0x20 [ 1784.315794] kmem_cache_alloc+0x5b/0x310 [ 1784.316440] create_object.isra.0+0x3a/0xa20 [ 1784.317128] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1784.317920] kmem_cache_alloc+0x159/0x310 [ 1784.318564] ? SOFTIRQ_verbose+0x10/0x10 [ 1784.319206] ep_ptable_queue_proc+0xa7/0x330 [ 1784.319870] ? ep_show_fdinfo+0x380/0x380 [ 1784.320508] n_tty_poll+0x79/0x8f0 [ 1784.321053] ? n_tty_ioctl+0x370/0x370 [ 1784.321665] tty_poll+0x144/0x1c0 [ 1784.322207] ? tty_release+0xe90/0xe90 [ 1784.322800] ep_item_poll+0x14c/0x3f0 [ 1784.323388] ? do_raw_spin_lock+0x121/0x260 [ 1784.324048] ? ep_eventpoll_poll+0x170/0x170 [ 1784.324717] ? rwlock_bug.part.0+0x90/0x90 [ 1784.325377] do_epoll_ctl+0x1a14/0x2c00 [ 1784.326015] ? lock_downgrade+0x6d0/0x6d0 [ 1784.326650] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1784.327404] ? ep_show_fdinfo+0x380/0x380 [ 1784.328056] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1784.328726] ? do_epoll_ctl+0x2c00/0x2c00 [ 1784.329369] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1784.330175] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1784.330972] do_syscall_64+0x33/0x40 [ 1784.331544] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1784.332324] RIP: 0033:0x7f0e28ca6b19 [ 1784.332897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1784.335670] RSP: 002b:00007f0e2621c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1784.336826] RAX: ffffffffffffffda RBX: 00007f0e28db9f60 RCX: 00007f0e28ca6b19 [ 1784.337910] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1784.338986] RBP: 00007f0e2621c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1784.340065] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1784.341141] R13: 00007ffdf47aca2f R14: 00007f0e2621c300 R15: 0000000000022000 [ 1784.390900] FAULT_INJECTION: forcing a failure. [ 1784.390900] name failslab, interval 1, probability 0, space 0, times 0 [ 1784.392764] CPU: 1 PID: 11415 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1784.393818] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1784.395052] Call Trace: [ 1784.395470] dump_stack+0x107/0x167 [ 1784.396040] should_fail.cold+0x5/0xa [ 1784.396632] ? create_object.isra.0+0x3a/0xa20 [ 1784.397332] should_failslab+0x5/0x20 [ 1784.397924] kmem_cache_alloc+0x5b/0x310 [ 1784.398552] create_object.isra.0+0x3a/0xa20 [ 1784.399221] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1784.400005] kmem_cache_alloc+0x159/0x310 [ 1784.400641] do_epoll_ctl+0xba2/0x2c00 [ 1784.401268] ? __might_fault+0xd3/0x180 [ 1784.401875] ? lock_downgrade+0x6d0/0x6d0 [ 1784.402504] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1784.403280] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1784.403953] ? do_epoll_ctl+0x2c00/0x2c00 [ 1784.404615] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1784.405432] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1784.406247] do_syscall_64+0x33/0x40 [ 1784.406958] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1784.407922] RIP: 0033:0x7f493a2a6b19 [ 1784.408503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1784.411320] RSP: 002b:00007f493781c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1784.412568] RAX: ffffffffffffffda RBX: 00007f493a3b9f60 RCX: 00007f493a2a6b19 [ 1784.413814] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1784.414996] RBP: 00007f493781c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1784.416339] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1784.417430] R13: 00007ffe4239de8f R14: 00007f493781c300 R15: 0000000000022000 05:32:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:32:21 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) 05:32:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x300, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:32:21 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 4) 05:32:21 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 89) 05:32:21 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 6) [ 1801.112331] FAULT_INJECTION: forcing a failure. [ 1801.112331] name failslab, interval 1, probability 0, space 0, times 0 [ 1801.113473] CPU: 0 PID: 11432 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1801.114073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1801.114774] Call Trace: [ 1801.115009] dump_stack+0x107/0x167 [ 1801.115328] should_fail.cold+0x5/0xa [ 1801.115657] ? alloc_vfsmnt+0x23/0x680 [ 1801.115995] should_failslab+0x5/0x20 [ 1801.116327] kmem_cache_alloc+0x5b/0x310 [ 1801.116674] ? trace_hardirqs_on+0x5b/0x180 [ 1801.117049] alloc_vfsmnt+0x23/0x680 [ 1801.117379] clone_mnt+0x6c/0xce0 [ 1801.117682] ? copy_tree+0x2e0/0xa60 [ 1801.118008] copy_tree+0x3b0/0xa60 [ 1801.118322] copy_mnt_ns+0x144/0xa00 [ 1801.118643] ? kmem_cache_alloc+0x2a6/0x310 [ 1801.119020] create_new_namespaces+0xd6/0xb20 [ 1801.119410] copy_namespaces+0x3fb/0x4f0 [ 1801.119763] copy_process+0x385b/0x7800 [ 1801.120110] ? __lockdep_reset_lock+0x180/0x180 [ 1801.120515] ? lock_acquire+0x1b9/0x470 [ 1801.120863] ? __cleanup_sighand+0xb0/0xb0 [ 1801.121240] ? _copy_from_user+0xfb/0x1b0 [ 1801.121601] kernel_clone+0xe7/0x980 [ 1801.121931] ? create_io_thread+0xf0/0xf0 [ 1801.122292] ? lock_downgrade+0x6d0/0x6d0 [ 1801.122650] ? enqueue_hrtimer+0x129/0x270 [ 1801.123019] __do_sys_clone3+0x1e5/0x320 [ 1801.123367] ? __do_sys_clone+0x110/0x110 [ 1801.123725] ? recalibrate_cpu_khz+0x10/0x10 [ 1801.124112] ? tick_program_event+0xa8/0x140 [ 1801.124490] ? hrtimer_interrupt+0x771/0x9b0 [ 1801.124874] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1801.125325] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1801.125760] ? trace_hardirqs_on+0x5b/0x180 [ 1801.126142] do_syscall_64+0x33/0x40 [ 1801.126462] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1801.126900] RIP: 0033:0x7f33add2bb19 [ 1801.127223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1801.128760] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1801.129406] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1801.130014] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1801.130614] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1801.131223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1801.131824] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 [ 1801.135149] FAULT_INJECTION: forcing a failure. [ 1801.135149] name failslab, interval 1, probability 0, space 0, times 0 [ 1801.136941] CPU: 1 PID: 11436 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1801.138022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1801.139289] Call Trace: [ 1801.139706] dump_stack+0x107/0x167 [ 1801.140282] should_fail.cold+0x5/0xa [ 1801.140878] ? ep_ptable_queue_proc+0xa7/0x330 [ 1801.141601] should_failslab+0x5/0x20 [ 1801.142208] kmem_cache_alloc+0x5b/0x310 [ 1801.142843] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1801.143630] ep_ptable_queue_proc+0xa7/0x330 [ 1801.144308] ? ep_show_fdinfo+0x380/0x380 [ 1801.144943] n_tty_poll+0xba/0x8f0 [ 1801.145504] ? n_tty_ioctl+0x370/0x370 [ 1801.146117] tty_poll+0x144/0x1c0 [ 1801.146671] ? tty_release+0xe90/0xe90 [ 1801.147249] ep_item_poll+0x14c/0x3f0 [ 1801.147837] ? do_raw_spin_lock+0x121/0x260 [ 1801.148487] ? ep_eventpoll_poll+0x170/0x170 [ 1801.149161] ? rwlock_bug.part.0+0x90/0x90 [ 1801.149835] do_epoll_ctl+0x1a14/0x2c00 [ 1801.150457] ? lock_downgrade+0x6d0/0x6d0 [ 1801.151102] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1801.151860] ? ep_show_fdinfo+0x380/0x380 [ 1801.152515] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1801.153174] ? do_epoll_ctl+0x2c00/0x2c00 [ 1801.153824] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1801.154617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1801.155422] do_syscall_64+0x33/0x40 [ 1801.155985] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1801.156761] RIP: 0033:0x7f0e28ca6b19 [ 1801.157335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1801.160118] RSP: 002b:00007f0e2621c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1801.161286] RAX: ffffffffffffffda RBX: 00007f0e28db9f60 RCX: 00007f0e28ca6b19 [ 1801.162385] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1801.163554] RBP: 00007f0e2621c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1801.164884] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1801.166209] R13: 00007ffdf47aca2f R14: 00007f0e2621c300 R15: 0000000000022000 [ 1801.168015] FAULT_INJECTION: forcing a failure. [ 1801.168015] name failslab, interval 1, probability 0, space 0, times 0 [ 1801.170146] CPU: 1 PID: 11437 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1801.171434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1801.172988] Call Trace: [ 1801.173490] dump_stack+0x107/0x167 [ 1801.174185] should_fail.cold+0x5/0xa [ 1801.174921] ? ep_ptable_queue_proc+0xa7/0x330 [ 1801.175788] should_failslab+0x5/0x20 [ 1801.176500] kmem_cache_alloc+0x5b/0x310 [ 1801.177268] ? SOFTIRQ_verbose+0x10/0x10 05:32:21 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, 0x0) r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:32:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1801.178054] ep_ptable_queue_proc+0xa7/0x330 [ 1801.179031] ? ep_show_fdinfo+0x380/0x380 [ 1801.179806] n_tty_poll+0x79/0x8f0 [ 1801.180468] ? n_tty_ioctl+0x370/0x370 [ 1801.181197] tty_poll+0x144/0x1c0 [ 1801.181859] ? tty_release+0xe90/0xe90 [ 1801.182573] ep_item_poll+0x14c/0x3f0 [ 1801.183292] ? do_raw_spin_lock+0x121/0x260 [ 1801.184093] ? ep_eventpoll_poll+0x170/0x170 [ 1801.184902] ? rwlock_bug.part.0+0x90/0x90 [ 1801.185709] do_epoll_ctl+0x1a14/0x2c00 [ 1801.186487] ? lock_downgrade+0x6d0/0x6d0 [ 1801.187266] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1801.188178] ? ep_show_fdinfo+0x380/0x380 [ 1801.188974] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1801.189780] ? do_epoll_ctl+0x2c00/0x2c00 [ 1801.190575] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1801.191544] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1801.192498] do_syscall_64+0x33/0x40 [ 1801.193180] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1801.194131] RIP: 0033:0x7f493a2a6b19 [ 1801.194816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1801.198102] RSP: 002b:00007f493781c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1801.199474] RAX: ffffffffffffffda RBX: 00007f493a3b9f60 RCX: 00007f493a2a6b19 [ 1801.200749] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1801.202042] RBP: 00007f493781c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1801.203321] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1801.204600] R13: 00007ffe4239de8f R14: 00007f493781c300 R15: 0000000000022000 05:32:21 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 90) 05:32:21 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(0xffffffffffffffff, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1801.323738] FAULT_INJECTION: forcing a failure. [ 1801.323738] name failslab, interval 1, probability 0, space 0, times 0 [ 1801.325100] CPU: 0 PID: 11541 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1801.325703] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1801.326442] Call Trace: [ 1801.326678] dump_stack+0x107/0x167 [ 1801.327011] should_fail.cold+0x5/0xa [ 1801.327345] ? create_object.isra.0+0x3a/0xa20 [ 1801.327753] should_failslab+0x5/0x20 [ 1801.328087] kmem_cache_alloc+0x5b/0x310 [ 1801.328449] create_object.isra.0+0x3a/0xa20 [ 1801.328838] kmemleak_alloc_percpu+0xa0/0x100 [ 1801.329227] pcpu_alloc+0x4e2/0x1240 [ 1801.329569] alloc_vfsmnt+0xfd/0x680 [ 1801.329901] clone_mnt+0x6c/0xce0 [ 1801.330221] copy_tree+0x3b0/0xa60 [ 1801.330538] copy_mnt_ns+0x144/0xa00 [ 1801.330865] ? kmem_cache_alloc+0x2a6/0x310 [ 1801.331249] create_new_namespaces+0xd6/0xb20 [ 1801.331644] copy_namespaces+0x3fb/0x4f0 [ 1801.332009] copy_process+0x385b/0x7800 [ 1801.332357] ? __lockdep_reset_lock+0x180/0x180 [ 1801.332766] ? mark_lock+0xf5/0x2df0 [ 1801.333096] ? lock_acquire+0x197/0x470 [ 1801.333464] ? __cleanup_sighand+0xb0/0xb0 [ 1801.333849] ? _copy_from_user+0xfb/0x1b0 [ 1801.334223] kernel_clone+0xe7/0x980 [ 1801.334545] ? __lockdep_reset_lock+0x180/0x180 [ 1801.334956] ? create_io_thread+0xf0/0xf0 [ 1801.335323] ? ksys_write+0x21a/0x260 [ 1801.335654] ? lock_downgrade+0x6d0/0x6d0 [ 1801.336016] __do_sys_clone3+0x1e5/0x320 [ 1801.336365] ? __do_sys_clone+0x110/0x110 [ 1801.336735] ? rcu_read_lock_any_held+0x75/0xa0 [ 1801.337141] ? vfs_write+0x354/0xa70 [ 1801.337470] ? fput_many+0x2f/0x1a0 [ 1801.337794] ? ksys_write+0x1a9/0x260 [ 1801.338133] ? __ia32_sys_read+0xb0/0xb0 [ 1801.338490] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1801.338953] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1801.339395] ? trace_hardirqs_on+0x5b/0x180 [ 1801.339776] do_syscall_64+0x33/0x40 [ 1801.340100] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1801.340552] RIP: 0033:0x7f33add2bb19 [ 1801.340875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1801.342489] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1801.343151] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1801.343779] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1801.344404] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1801.345020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1801.345640] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:32:21 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:32:21 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 7) 05:32:21 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 5) [ 1801.491134] FAULT_INJECTION: forcing a failure. [ 1801.491134] name failslab, interval 1, probability 0, space 0, times 0 [ 1801.492203] CPU: 0 PID: 11553 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1801.492805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1801.493548] Call Trace: [ 1801.493794] dump_stack+0x107/0x167 [ 1801.494132] should_fail.cold+0x5/0xa [ 1801.494475] ? create_object.isra.0+0x3a/0xa20 [ 1801.494891] should_failslab+0x5/0x20 [ 1801.495240] kmem_cache_alloc+0x5b/0x310 [ 1801.495604] create_object.isra.0+0x3a/0xa20 [ 1801.495991] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1801.496440] kmem_cache_alloc+0x159/0x310 [ 1801.496809] ? SOFTIRQ_verbose+0x10/0x10 [ 1801.497176] ep_ptable_queue_proc+0xa7/0x330 [ 1801.497566] ? ep_show_fdinfo+0x380/0x380 [ 1801.497941] n_tty_poll+0x79/0x8f0 [ 1801.498262] ? n_tty_ioctl+0x370/0x370 [ 1801.498614] tty_poll+0x144/0x1c0 [ 1801.498927] ? tty_release+0xe90/0xe90 [ 1801.499281] ep_item_poll+0x14c/0x3f0 [ 1801.499628] ? do_raw_spin_lock+0x121/0x260 [ 1801.500012] ? ep_eventpoll_poll+0x170/0x170 [ 1801.500397] ? rwlock_bug.part.0+0x90/0x90 [ 1801.500784] do_epoll_ctl+0x1a14/0x2c00 [ 1801.501157] ? lock_downgrade+0x6d0/0x6d0 [ 1801.501521] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1801.501955] ? ep_show_fdinfo+0x380/0x380 [ 1801.502327] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1801.502709] ? do_epoll_ctl+0x2c00/0x2c00 [ 1801.503078] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1801.503554] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1801.504018] do_syscall_64+0x33/0x40 [ 1801.504357] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1801.504801] RIP: 0033:0x7f493a2a6b19 [ 1801.505140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1801.506744] RSP: 002b:00007f493781c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1801.507415] RAX: ffffffffffffffda RBX: 00007f493a3b9f60 RCX: 00007f493a2a6b19 [ 1801.508036] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1801.508666] RBP: 00007f493781c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1801.509286] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1801.509882] FAULT_INJECTION: forcing a failure. [ 1801.509882] name failslab, interval 1, probability 0, space 0, times 0 [ 1801.510845] R13: 00007ffe4239de8f R14: 00007f493781c300 R15: 0000000000022000 [ 1801.512216] CPU: 1 PID: 11555 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1801.513384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1801.514750] Call Trace: [ 1801.515206] dump_stack+0x107/0x167 [ 1801.515829] should_fail.cold+0x5/0xa [ 1801.516490] ? create_object.isra.0+0x3a/0xa20 [ 1801.517251] should_failslab+0x5/0x20 [ 1801.517907] kmem_cache_alloc+0x5b/0x310 [ 1801.518596] create_object.isra.0+0x3a/0xa20 [ 1801.519343] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1801.520212] kmem_cache_alloc+0x159/0x310 [ 1801.520915] ep_ptable_queue_proc+0xa7/0x330 [ 1801.521641] ? ep_show_fdinfo+0x380/0x380 [ 1801.522361] n_tty_poll+0xba/0x8f0 [ 1801.522961] ? n_tty_ioctl+0x370/0x370 [ 1801.523626] tty_poll+0x144/0x1c0 [ 1801.524214] ? tty_release+0xe90/0xe90 [ 1801.524864] ep_item_poll+0x14c/0x3f0 [ 1801.525511] ? do_raw_spin_lock+0x121/0x260 [ 1801.526248] ? ep_eventpoll_poll+0x170/0x170 [ 1801.526980] ? rwlock_bug.part.0+0x90/0x90 [ 1801.527701] do_epoll_ctl+0x1a14/0x2c00 [ 1801.528386] ? lock_downgrade+0x6d0/0x6d0 [ 1801.529094] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1801.529934] ? ep_show_fdinfo+0x380/0x380 [ 1801.530650] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1801.531376] ? do_epoll_ctl+0x2c00/0x2c00 [ 1801.532078] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1801.532948] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1801.533832] do_syscall_64+0x33/0x40 [ 1801.534446] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1801.535309] RIP: 0033:0x7f0e28ca6b19 [ 1801.535926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1801.538953] RSP: 002b:00007f0e2621c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1801.540197] RAX: ffffffffffffffda RBX: 00007f0e28db9f60 RCX: 00007f0e28ca6b19 [ 1801.541365] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1801.542543] RBP: 00007f0e2621c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1801.543709] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1801.544880] R13: 00007ffdf47aca2f R14: 00007f0e2621c300 R15: 0000000000022000 [ 1818.771758] FAULT_INJECTION: forcing a failure. [ 1818.771758] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1818.774307] CPU: 1 PID: 11576 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1818.775418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1818.776736] Call Trace: [ 1818.777168] dump_stack+0x107/0x167 [ 1818.777765] should_fail.cold+0x5/0xa [ 1818.778392] _copy_to_user+0x2e/0x180 05:32:39 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 6) 05:32:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:32:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:32:39 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x174120004, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1818.779021] simple_read_from_buffer+0xcc/0x160 05:32:39 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 91) 05:32:39 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 8) 05:32:39 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(0xffffffffffffffff, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:32:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x3e8, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 1818.779966] proc_fail_nth_read+0x198/0x230 [ 1818.780918] ? proc_sessionid_read+0x230/0x230 [ 1818.781831] ? security_file_permission+0x24e/0x570 [ 1818.782634] ? perf_trace_initcall_start+0x101/0x380 [ 1818.783444] ? proc_sessionid_read+0x230/0x230 [ 1818.784158] vfs_read+0x228/0x580 [ 1818.784713] ksys_read+0x12d/0x260 [ 1818.785273] ? vfs_write+0xa70/0xa70 [ 1818.785865] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1818.786690] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1818.787504] do_syscall_64+0x33/0x40 [ 1818.788089] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1818.788890] RIP: 0033:0x7f0e28c5969c [ 1818.789475] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1818.792306] RSP: 002b:00007f0e2621c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1818.793494] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0e28c5969c [ 1818.794598] RDX: 000000000000000f RSI: 00007f0e2621c1e0 RDI: 0000000000000005 [ 1818.795700] RBP: 00007f0e2621c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1818.796792] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1818.797891] R13: 00007ffdf47aca2f R14: 00007f0e2621c300 R15: 0000000000022000 [ 1818.817886] FAULT_INJECTION: forcing a failure. [ 1818.817886] name failslab, interval 1, probability 0, space 0, times 0 [ 1818.819572] CPU: 0 PID: 11596 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1818.820550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1818.821724] Call Trace: [ 1818.822113] dump_stack+0x107/0x167 [ 1818.822645] should_fail.cold+0x5/0xa [ 1818.823195] ? ep_ptable_queue_proc+0xa7/0x330 [ 1818.823849] should_failslab+0x5/0x20 05:32:39 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) [ 1818.824398] kmem_cache_alloc+0x5b/0x310 [ 1818.825125] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1818.825848] ep_ptable_queue_proc+0xa7/0x330 [ 1818.826468] ? ep_show_fdinfo+0x380/0x380 [ 1818.827046] n_tty_poll+0xba/0x8f0 [ 1818.827551] ? n_tty_ioctl+0x370/0x370 [ 1818.828101] tty_poll+0x144/0x1c0 [ 1818.828596] ? tty_release+0xe90/0xe90 [ 1818.829133] ep_item_poll+0x14c/0x3f0 [ 1818.829668] ? do_raw_spin_lock+0x121/0x260 [ 1818.830276] ? ep_eventpoll_poll+0x170/0x170 [ 1818.830898] ? rwlock_bug.part.0+0x90/0x90 [ 1818.831501] do_epoll_ctl+0x1a14/0x2c00 [ 1818.832085] ? lock_downgrade+0x6d0/0x6d0 [ 1818.832662] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1818.833359] ? ep_show_fdinfo+0x380/0x380 [ 1818.833952] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1818.834577] ? do_epoll_ctl+0x2c00/0x2c00 [ 1818.835165] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1818.835902] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1818.836626] do_syscall_64+0x33/0x40 [ 1818.837150] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1818.837860] RIP: 0033:0x7f493a2a6b19 [ 1818.838403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1818.840925] RSP: 002b:00007f493781c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1818.841987] RAX: ffffffffffffffda RBX: 00007f493a3b9f60 RCX: 00007f493a2a6b19 [ 1818.842996] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1818.843994] RBP: 00007f493781c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1818.844995] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1818.846005] R13: 00007ffe4239de8f R14: 00007f493781c300 R15: 0000000000022000 [ 1818.863883] FAULT_INJECTION: forcing a failure. [ 1818.863883] name failslab, interval 1, probability 0, space 0, times 0 [ 1818.865812] CPU: 1 PID: 11590 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1818.866960] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1818.868269] Call Trace: [ 1818.868692] dump_stack+0x107/0x167 [ 1818.869279] should_fail.cold+0x5/0xa [ 1818.869900] should_failslab+0x5/0x20 [ 1818.870515] __kmalloc_track_caller+0x79/0x370 [ 1818.871237] ? kstrdup_const+0x53/0x80 [ 1818.871865] kstrdup+0x36/0x70 [ 1818.872381] kstrdup_const+0x53/0x80 [ 1818.872980] alloc_vfsmnt+0xb5/0x680 [ 1818.873578] clone_mnt+0x6c/0xce0 [ 1818.874163] copy_tree+0x3b0/0xa60 [ 1818.874749] copy_mnt_ns+0x144/0xa00 [ 1818.875344] ? kmem_cache_alloc+0x2a6/0x310 [ 1818.876036] create_new_namespaces+0xd6/0xb20 [ 1818.876755] copy_namespaces+0x3fb/0x4f0 [ 1818.877400] copy_process+0x385b/0x7800 [ 1818.878065] ? __lockdep_reset_lock+0x180/0x180 [ 1818.878802] ? mark_lock+0xf5/0x2df0 [ 1818.879397] ? lock_acquire+0x197/0x470 [ 1818.880055] ? __cleanup_sighand+0xb0/0xb0 [ 1818.880750] ? _copy_from_user+0xfb/0x1b0 [ 1818.881408] kernel_clone+0xe7/0x980 [ 1818.882016] ? __lockdep_reset_lock+0x180/0x180 [ 1818.882742] ? create_io_thread+0xf0/0xf0 [ 1818.883424] ? ksys_write+0x21a/0x260 [ 1818.884023] ? lock_downgrade+0x6d0/0x6d0 [ 1818.884694] __do_sys_clone3+0x1e5/0x320 [ 1818.885344] ? __do_sys_clone+0x110/0x110 [ 1818.886041] ? rcu_read_lock_any_held+0x75/0xa0 [ 1818.886782] ? vfs_write+0x354/0xa70 [ 1818.887380] ? fput_many+0x2f/0x1a0 [ 1818.887946] ? ksys_write+0x1a9/0x260 [ 1818.888549] ? __ia32_sys_read+0xb0/0xb0 [ 1818.889182] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1818.890015] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1818.890821] ? trace_hardirqs_on+0x5b/0x180 [ 1818.891511] do_syscall_64+0x33/0x40 [ 1818.892085] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1818.892893] RIP: 0033:0x7f33add2bb19 [ 1818.893483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1818.896354] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1818.897552] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1818.898669] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1818.899786] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1818.900901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1818.902026] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:32:39 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x2, r1, &(0x7f00000000c0)) 05:32:39 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 7) 05:32:39 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c502, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:32:39 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x300, r1, &(0x7f00000000c0)) [ 1819.061459] FAULT_INJECTION: forcing a failure. [ 1819.061459] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.063448] CPU: 1 PID: 11691 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1819.064554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.065875] Call Trace: [ 1819.066319] dump_stack+0x107/0x167 [ 1819.066917] should_fail.cold+0x5/0xa [ 1819.067540] ? create_object.isra.0+0x3a/0xa20 [ 1819.068288] should_failslab+0x5/0x20 [ 1819.068911] kmem_cache_alloc+0x5b/0x310 [ 1819.069579] create_object.isra.0+0x3a/0xa20 [ 1819.070303] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1819.071126] kmem_cache_alloc+0x159/0x310 [ 1819.071808] ep_ptable_queue_proc+0xa7/0x330 [ 1819.072511] ? ep_show_fdinfo+0x380/0x380 [ 1819.073188] n_tty_poll+0xba/0x8f0 [ 1819.073771] ? n_tty_ioctl+0x370/0x370 [ 1819.074415] tty_poll+0x144/0x1c0 [ 1819.074986] ? tty_release+0xe90/0xe90 [ 1819.075608] ep_item_poll+0x14c/0x3f0 [ 1819.076232] ? do_raw_spin_lock+0x121/0x260 [ 1819.076927] ? ep_eventpoll_poll+0x170/0x170 [ 1819.077637] ? rwlock_bug.part.0+0x90/0x90 [ 1819.078342] do_epoll_ctl+0x1a14/0x2c00 [ 1819.079003] ? lock_downgrade+0x6d0/0x6d0 [ 1819.079670] ? __ia32_sys_epoll_create+0x1e0/0x1e0 [ 1819.080460] ? ep_show_fdinfo+0x380/0x380 [ 1819.081138] __x64_sys_epoll_ctl+0x13f/0x1c0 [ 1819.081835] ? do_epoll_ctl+0x2c00/0x2c00 [ 1819.082526] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.083358] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1819.084191] do_syscall_64+0x33/0x40 [ 1819.084787] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1819.085608] RIP: 0033:0x7f493a2a6b19 [ 1819.086217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.089120] RSP: 002b:00007f493781c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1819.090330] RAX: ffffffffffffffda RBX: 00007f493a3b9f60 RCX: 00007f493a2a6b19 [ 1819.091441] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 1819.092556] RBP: 00007f493781c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.093661] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1819.094787] R13: 00007ffe4239de8f R14: 00007f493781c300 R15: 0000000000022000 05:32:39 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 92) 05:32:39 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:32:39 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c503, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1819.261453] FAULT_INJECTION: forcing a failure. [ 1819.261453] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.263072] CPU: 0 PID: 11798 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1819.263812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.264691] Call Trace: [ 1819.264985] dump_stack+0x107/0x167 [ 1819.265384] should_fail.cold+0x5/0xa [ 1819.265795] ? create_object.isra.0+0x3a/0xa20 [ 1819.266293] should_failslab+0x5/0x20 [ 1819.266701] kmem_cache_alloc+0x5b/0x310 [ 1819.267143] create_object.isra.0+0x3a/0xa20 [ 1819.267612] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1819.268157] __kmalloc_track_caller+0x177/0x370 [ 1819.268652] ? kstrdup_const+0x53/0x80 [ 1819.269075] kstrdup+0x36/0x70 [ 1819.269421] kstrdup_const+0x53/0x80 [ 1819.269822] alloc_vfsmnt+0xb5/0x680 [ 1819.270228] clone_mnt+0x6c/0xce0 [ 1819.270607] copy_tree+0x3b0/0xa60 [ 1819.270999] copy_mnt_ns+0x144/0xa00 [ 1819.271398] ? kmem_cache_alloc+0x2a6/0x310 [ 1819.271863] create_new_namespaces+0xd6/0xb20 [ 1819.272345] copy_namespaces+0x3fb/0x4f0 [ 1819.272780] copy_process+0x385b/0x7800 [ 1819.273205] ? __lockdep_reset_lock+0x180/0x180 [ 1819.273695] ? mark_lock+0xf5/0x2df0 [ 1819.274102] ? lock_acquire+0x197/0x470 [ 1819.274539] ? __cleanup_sighand+0xb0/0xb0 [ 1819.275000] ? _copy_from_user+0xfb/0x1b0 [ 1819.275445] kernel_clone+0xe7/0x980 [ 1819.275839] ? __lockdep_reset_lock+0x180/0x180 [ 1819.276335] ? create_io_thread+0xf0/0xf0 [ 1819.276786] ? ksys_write+0x21a/0x260 [ 1819.277193] ? lock_downgrade+0x6d0/0x6d0 [ 1819.277635] __do_sys_clone3+0x1e5/0x320 [ 1819.278074] ? __do_sys_clone+0x110/0x110 [ 1819.278533] ? rcu_read_lock_any_held+0x75/0xa0 [ 1819.279025] ? vfs_write+0x354/0xa70 [ 1819.279421] ? fput_many+0x2f/0x1a0 [ 1819.279806] ? ksys_write+0x1a9/0x260 [ 1819.280207] ? __ia32_sys_read+0xb0/0xb0 [ 1819.280637] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.281189] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1819.281723] ? trace_hardirqs_on+0x5b/0x180 [ 1819.282190] do_syscall_64+0x33/0x40 [ 1819.282594] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1819.283133] RIP: 0033:0x7f33add2bb19 [ 1819.283524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.285423] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1819.286224] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1819.286969] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1819.287713] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.288458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1819.289199] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:32:39 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) (fail_nth: 8) [ 1819.372341] FAULT_INJECTION: forcing a failure. [ 1819.372341] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1819.374326] CPU: 1 PID: 11805 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1819.375407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.376635] Call Trace: [ 1819.377039] dump_stack+0x107/0x167 [ 1819.377588] should_fail.cold+0x5/0xa [ 1819.378180] _copy_to_user+0x2e/0x180 [ 1819.378757] simple_read_from_buffer+0xcc/0x160 [ 1819.379456] proc_fail_nth_read+0x198/0x230 [ 1819.380104] ? proc_sessionid_read+0x230/0x230 [ 1819.380785] ? security_file_permission+0x24e/0x570 [ 1819.381532] ? perf_trace_initcall_start+0x101/0x380 [ 1819.382308] ? proc_sessionid_read+0x230/0x230 [ 1819.382987] vfs_read+0x228/0x580 [ 1819.383523] ksys_read+0x12d/0x260 [ 1819.384062] ? vfs_write+0xa70/0xa70 [ 1819.384629] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.385405] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1819.386192] do_syscall_64+0x33/0x40 [ 1819.386748] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1819.387511] RIP: 0033:0x7f493a25969c [ 1819.388062] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1819.390831] RSP: 002b:00007f493781c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1819.391959] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f493a25969c [ 1819.393002] RDX: 000000000000000f RSI: 00007f493781c1e0 RDI: 0000000000000005 [ 1819.394053] RBP: 00007f493781c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.395103] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1819.396155] R13: 00007ffe4239de8f R14: 00007f493781c300 R15: 0000000000022000 05:32:55 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:32:55 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:32:55 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = fsmount(0xffffffffffffffff, 0x0, 0x88) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:32:55 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x8}) 05:32:55 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 93) 05:32:55 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c504, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:32:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:32:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x5dc, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:32:55 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xff00}) [ 1834.614437] FAULT_INJECTION: forcing a failure. [ 1834.614437] name failslab, interval 1, probability 0, space 0, times 0 [ 1834.616085] CPU: 0 PID: 11946 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1834.616941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1834.617984] Call Trace: [ 1834.618333] dump_stack+0x107/0x167 [ 1834.618792] should_fail.cold+0x5/0xa [ 1834.619271] ? create_object.isra.0+0x3a/0xa20 [ 1834.619839] should_failslab+0x5/0x20 [ 1834.620315] kmem_cache_alloc+0x5b/0x310 [ 1834.620835] create_object.isra.0+0x3a/0xa20 [ 1834.621404] kmemleak_alloc_percpu+0xa0/0x100 [ 1834.621982] pcpu_alloc+0x4e2/0x1240 [ 1834.622478] alloc_vfsmnt+0xfd/0x680 [ 1834.622948] clone_mnt+0x6c/0xce0 [ 1834.623392] copy_tree+0x3b0/0xa60 [ 1834.623849] copy_mnt_ns+0x144/0xa00 [ 1834.624330] ? kmem_cache_alloc+0x2a6/0x310 [ 1834.624873] create_new_namespaces+0xd6/0xb20 [ 1834.625444] copy_namespaces+0x3fb/0x4f0 [ 1834.625959] copy_process+0x385b/0x7800 [ 1834.626465] ? __lockdep_reset_lock+0x180/0x180 [ 1834.627043] ? mark_lock+0xf5/0x2df0 [ 1834.627517] ? lock_acquire+0x197/0x470 [ 1834.628029] ? __cleanup_sighand+0xb0/0xb0 [ 1834.628584] ? _copy_from_user+0xfb/0x1b0 [ 1834.629117] kernel_clone+0xe7/0x980 [ 1834.629586] ? __lockdep_reset_lock+0x180/0x180 [ 1834.630172] ? create_io_thread+0xf0/0xf0 [ 1834.630728] ? ksys_write+0x21a/0x260 [ 1834.631206] ? lock_downgrade+0x6d0/0x6d0 [ 1834.631734] __do_sys_clone3+0x1e5/0x320 [ 1834.632256] ? __do_sys_clone+0x110/0x110 [ 1834.632799] ? rcu_read_lock_any_held+0x75/0xa0 [ 1834.633376] ? vfs_write+0x354/0xa70 [ 1834.633850] ? fput_many+0x2f/0x1a0 [ 1834.634325] ? ksys_write+0x1a9/0x260 [ 1834.634802] ? __ia32_sys_read+0xb0/0xb0 [ 1834.635317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1834.635969] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1834.636612] ? trace_hardirqs_on+0x5b/0x180 [ 1834.637165] do_syscall_64+0x33/0x40 [ 1834.637634] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1834.638276] RIP: 0033:0x7f33add2bb19 [ 1834.638737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1834.641019] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1834.641967] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1834.642865] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1834.643841] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1834.644705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1834.645567] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:32:55 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c505, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:32:55 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x2, r1, &(0x7f00000000c0)) 05:32:55 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x1000000}) 05:32:55 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x300, r1, &(0x7f00000000c0)) 05:32:55 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x8000000}) 05:32:55 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c506, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:32:55 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xff000000}) 05:32:55 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:32:55 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0x8}) 05:33:11 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c507, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:33:11 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0xff00}) 05:33:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:33:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:33:11 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x8}) 05:33:11 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x0) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:33:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x900, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:33:11 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 94) [ 1850.567104] FAULT_INJECTION: forcing a failure. [ 1850.567104] name failslab, interval 1, probability 0, space 0, times 0 [ 1850.568608] CPU: 1 PID: 12289 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1850.569364] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1850.570279] Call Trace: [ 1850.570587] dump_stack+0x107/0x167 [ 1850.571001] should_fail.cold+0x5/0xa [ 1850.571434] ? create_object.isra.0+0x3a/0xa20 [ 1850.571952] should_failslab+0x5/0x20 [ 1850.572377] kmem_cache_alloc+0x5b/0x310 [ 1850.572833] ? mark_held_locks+0x9e/0xe0 [ 1850.573296] create_object.isra.0+0x3a/0xa20 [ 1850.573807] kmemleak_alloc_percpu+0xa0/0x100 [ 1850.574304] pcpu_alloc+0x4e2/0x1240 [ 1850.574751] alloc_vfsmnt+0xfd/0x680 [ 1850.575168] clone_mnt+0x6c/0xce0 [ 1850.575568] copy_tree+0x3b0/0xa60 [ 1850.575979] copy_mnt_ns+0x144/0xa00 [ 1850.576398] ? kmem_cache_alloc+0x2a6/0x310 [ 1850.576886] create_new_namespaces+0xd6/0xb20 [ 1850.577393] copy_namespaces+0x3fb/0x4f0 [ 1850.577851] copy_process+0x385b/0x7800 [ 1850.578291] ? __lockdep_reset_lock+0x180/0x180 [ 1850.578804] ? mark_lock+0xf5/0x2df0 [ 1850.579226] ? lock_acquire+0x197/0x470 [ 1850.579683] ? __cleanup_sighand+0xb0/0xb0 [ 1850.580164] ? _copy_from_user+0xfb/0x1b0 [ 1850.580629] kernel_clone+0xe7/0x980 [ 1850.581046] ? __lockdep_reset_lock+0x180/0x180 [ 1850.581571] ? create_io_thread+0xf0/0xf0 [ 1850.582049] ? ksys_write+0x21a/0x260 [ 1850.582477] ? lock_downgrade+0x6d0/0x6d0 [ 1850.582941] __do_sys_clone3+0x1e5/0x320 [ 1850.583389] ? __do_sys_clone+0x110/0x110 [ 1850.583856] ? rcu_read_lock_any_held+0x75/0xa0 [ 1850.584364] ? vfs_write+0x354/0xa70 [ 1850.584779] ? fput_many+0x2f/0x1a0 [ 1850.585187] ? ksys_write+0x1a9/0x260 [ 1850.585605] ? __ia32_sys_read+0xb0/0xb0 [ 1850.586061] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1850.586650] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1850.587217] ? trace_hardirqs_on+0x5b/0x180 [ 1850.587694] do_syscall_64+0x33/0x40 [ 1850.588102] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1850.588660] RIP: 0033:0x7f33add2bb19 [ 1850.589063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1850.591060] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1850.591876] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1850.592636] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1850.593398] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1850.594168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1850.594938] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:33:11 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0x1000000}) 05:33:11 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0x8000000}) 05:33:11 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xff00}) 05:33:11 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0xff000000}) 05:33:11 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c508, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:33:11 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x1000000}) 05:33:11 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0x100000000000000}) 05:33:11 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 95) 05:33:11 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x0) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1851.019772] FAULT_INJECTION: forcing a failure. [ 1851.019772] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.020929] CPU: 1 PID: 12496 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1851.021513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1851.022207] Call Trace: [ 1851.022454] dump_stack+0x107/0x167 [ 1851.022771] should_fail.cold+0x5/0xa [ 1851.023101] ? alloc_vfsmnt+0x23/0x680 [ 1851.023435] should_failslab+0x5/0x20 [ 1851.023761] kmem_cache_alloc+0x5b/0x310 [ 1851.024108] ? copy_tree+0x61a/0xa60 [ 1851.024432] alloc_vfsmnt+0x23/0x680 [ 1851.024754] clone_mnt+0x6c/0xce0 [ 1851.025055] copy_tree+0x3b0/0xa60 [ 1851.025375] copy_mnt_ns+0x144/0xa00 [ 1851.025698] ? kmem_cache_alloc+0x2a6/0x310 [ 1851.026074] create_new_namespaces+0xd6/0xb20 [ 1851.026464] copy_namespaces+0x3fb/0x4f0 [ 1851.026818] copy_process+0x385b/0x7800 [ 1851.027160] ? __lockdep_reset_lock+0x180/0x180 [ 1851.027551] ? mark_lock+0xf5/0x2df0 [ 1851.027875] ? lock_acquire+0x197/0x470 [ 1851.028226] ? __cleanup_sighand+0xb0/0xb0 [ 1851.028592] ? _copy_from_user+0xfb/0x1b0 [ 1851.028952] kernel_clone+0xe7/0x980 [ 1851.029268] ? __lockdep_reset_lock+0x180/0x180 [ 1851.029659] ? create_io_thread+0xf0/0xf0 [ 1851.030021] ? ksys_write+0x21a/0x260 [ 1851.030340] ? lock_downgrade+0x6d0/0x6d0 [ 1851.030701] __do_sys_clone3+0x1e5/0x320 [ 1851.031045] ? __do_sys_clone+0x110/0x110 [ 1851.031412] ? rcu_read_lock_any_held+0x75/0xa0 [ 1851.031805] ? vfs_write+0x354/0xa70 [ 1851.032123] ? fput_many+0x2f/0x1a0 [ 1851.032436] ? ksys_write+0x1a9/0x260 [ 1851.032756] ? __ia32_sys_read+0xb0/0xb0 [ 1851.033104] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1851.033556] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1851.033992] ? trace_hardirqs_on+0x5b/0x180 [ 1851.034356] do_syscall_64+0x33/0x40 [ 1851.034678] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1851.035109] RIP: 0033:0x7f33add2bb19 [ 1851.035424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.036958] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1851.037617] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1851.038216] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1851.038814] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1851.039403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1851.039999] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:33:11 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x8000000}) 05:33:26 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c50a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:33:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:33:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:33:26 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0x800000000000000}) 05:33:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:33:26 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x0) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:33:26 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 96) 05:33:26 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xff000000}) [ 1866.490631] FAULT_INJECTION: forcing a failure. [ 1866.490631] name failslab, interval 1, probability 0, space 0, times 0 [ 1866.492945] CPU: 1 PID: 12541 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1866.494267] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1866.495778] Call Trace: [ 1866.496273] dump_stack+0x107/0x167 [ 1866.496961] should_fail.cold+0x5/0xa [ 1866.497666] ? create_object.isra.0+0x3a/0xa20 [ 1866.498508] should_failslab+0x5/0x20 [ 1866.499219] kmem_cache_alloc+0x5b/0x310 [ 1866.499960] ? __lockdep_reset_lock+0x180/0x180 [ 1866.500824] create_object.isra.0+0x3a/0xa20 [ 1866.501613] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1866.502539] kmem_cache_alloc+0x159/0x310 [ 1866.503325] alloc_vfsmnt+0x23/0x680 [ 1866.504016] clone_mnt+0x6c/0xce0 [ 1866.504670] copy_tree+0x3b0/0xa60 [ 1866.505349] copy_mnt_ns+0x144/0xa00 [ 1866.506034] ? kmem_cache_alloc+0x2a6/0x310 [ 1866.506836] create_new_namespaces+0xd6/0xb20 [ 1866.507675] copy_namespaces+0x3fb/0x4f0 [ 1866.508429] copy_process+0x385b/0x7800 [ 1866.509162] ? __lockdep_reset_lock+0x180/0x180 [ 1866.510005] ? mark_lock+0xf5/0x2df0 [ 1866.510704] ? lock_acquire+0x197/0x470 [ 1866.511462] ? __cleanup_sighand+0xb0/0xb0 [ 1866.512259] ? _copy_from_user+0xfb/0x1b0 [ 1866.513024] kernel_clone+0xe7/0x980 [ 1866.513700] ? __lockdep_reset_lock+0x180/0x180 [ 1866.514562] ? create_io_thread+0xf0/0xf0 [ 1866.515332] ? ksys_write+0x21a/0x260 [ 1866.515942] ? lock_downgrade+0x6d0/0x6d0 [ 1866.516608] __do_sys_clone3+0x1e5/0x320 [ 1866.517256] ? __do_sys_clone+0x110/0x110 [ 1866.517942] ? rcu_read_lock_any_held+0x75/0xa0 [ 1866.518684] ? vfs_write+0x354/0xa70 [ 1866.519292] ? fput_many+0x2f/0x1a0 [ 1866.519874] ? ksys_write+0x1a9/0x260 [ 1866.520496] ? __ia32_sys_read+0xb0/0xb0 [ 1866.521157] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1866.522000] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1866.522832] ? trace_hardirqs_on+0x5b/0x180 [ 1866.523537] do_syscall_64+0x33/0x40 [ 1866.524137] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1866.524956] RIP: 0033:0x7f33add2bb19 [ 1866.525554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1866.528492] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1866.529708] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1866.530858] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1866.531997] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1866.533134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1866.534275] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:33:27 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0x8}) 05:33:27 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c50c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:33:27 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0xff00}) 05:33:27 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0xff00000000000000}) 05:33:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x2000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:33:43 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0x1000000}) 05:33:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:33:43 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') fsmount(r3, 0x0, 0x88) openat(0xffffffffffffffff, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:33:43 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 97) 05:33:43 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x8001, 0x40800) r3 = epoll_create(0x7ffd) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000080)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f00000000c0)) ioctl$KDSETMODE(r5, 0x4b3a, 0x1) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x10000) 05:33:43 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c510, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:33:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1883.494178] FAULT_INJECTION: forcing a failure. [ 1883.494178] name failslab, interval 1, probability 0, space 0, times 0 [ 1883.494200] CPU: 0 PID: 12781 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1883.494211] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1883.494217] Call Trace: [ 1883.494241] dump_stack+0x107/0x167 [ 1883.494266] should_fail.cold+0x5/0xa [ 1883.494294] should_failslab+0x5/0x20 [ 1883.494312] __kmalloc_track_caller+0x79/0x370 [ 1883.494330] ? kstrdup_const+0x53/0x80 [ 1883.494357] kstrdup+0x36/0x70 [ 1883.494378] kstrdup_const+0x53/0x80 [ 1883.494397] alloc_vfsmnt+0xb5/0x680 [ 1883.494424] clone_mnt+0x6c/0xce0 [ 1883.494453] copy_tree+0x3b0/0xa60 [ 1883.494490] copy_mnt_ns+0x144/0xa00 [ 1883.494512] ? kmem_cache_alloc+0x2a6/0x310 05:33:44 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0x8000000}) [ 1883.494540] create_new_namespaces+0xd6/0xb20 [ 1883.494569] copy_namespaces+0x3fb/0x4f0 [ 1883.494593] copy_process+0x385b/0x7800 [ 1883.494614] ? __lockdep_reset_lock+0x180/0x180 [ 1883.494630] ? mark_lock+0xf5/0x2df0 [ 1883.494657] ? lock_acquire+0x197/0x470 [ 1883.494696] ? __cleanup_sighand+0xb0/0xb0 [ 1883.494733] ? _copy_from_user+0xfb/0x1b0 [ 1883.494783] kernel_clone+0xe7/0x980 [ 1883.494800] ? __lockdep_reset_lock+0x180/0x180 [ 1883.494821] ? create_io_thread+0xf0/0xf0 [ 1883.494857] ? ksys_write+0x21a/0x260 [ 1883.494876] ? lock_downgrade+0x6d0/0x6d0 05:33:44 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 98) [ 1883.494901] __do_sys_clone3+0x1e5/0x320 [ 1883.494919] ? __do_sys_clone+0x110/0x110 [ 1883.494961] ? rcu_read_lock_any_held+0x75/0xa0 [ 1883.494976] ? vfs_write+0x354/0xa70 [ 1883.495000] ? fput_many+0x2f/0x1a0 [ 1883.495020] ? ksys_write+0x1a9/0x260 [ 1883.495039] ? __ia32_sys_read+0xb0/0xb0 [ 1883.495063] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1883.495082] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1883.495097] ? trace_hardirqs_on+0x5b/0x180 [ 1883.495122] do_syscall_64+0x33/0x40 [ 1883.495139] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1883.495152] RIP: 0033:0x7f33add2bb19 [ 1883.495170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1883.495180] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1883.495201] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1883.495212] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 05:33:44 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c511, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1883.495222] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1883.495232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1883.495243] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 [ 1883.702257] FAULT_INJECTION: forcing a failure. [ 1883.702257] name failslab, interval 1, probability 0, space 0, times 0 [ 1883.702280] CPU: 0 PID: 12895 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1883.702291] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1883.702297] Call Trace: [ 1883.702321] dump_stack+0x107/0x167 [ 1883.702346] should_fail.cold+0x5/0xa [ 1883.702367] ? create_object.isra.0+0x3a/0xa20 [ 1883.702389] should_failslab+0x5/0x20 [ 1883.702407] kmem_cache_alloc+0x5b/0x310 [ 1883.702438] create_object.isra.0+0x3a/0xa20 [ 1883.702457] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1883.702483] __kmalloc_track_caller+0x177/0x370 [ 1883.702501] ? kstrdup_const+0x53/0x80 [ 1883.702527] kstrdup+0x36/0x70 [ 1883.702548] kstrdup_const+0x53/0x80 [ 1883.702567] alloc_vfsmnt+0xb5/0x680 [ 1883.702589] clone_mnt+0x6c/0xce0 [ 1883.702618] copy_tree+0x3b0/0xa60 [ 1883.702654] copy_mnt_ns+0x144/0xa00 [ 1883.702676] ? kmem_cache_alloc+0x2a6/0x310 [ 1883.702703] create_new_namespaces+0xd6/0xb20 [ 1883.702732] copy_namespaces+0x3fb/0x4f0 [ 1883.702769] copy_process+0x385b/0x7800 [ 1883.702791] ? __lockdep_reset_lock+0x180/0x180 [ 1883.702806] ? mark_lock+0xf5/0x2df0 [ 1883.702833] ? lock_acquire+0x197/0x470 [ 1883.702873] ? __cleanup_sighand+0xb0/0xb0 [ 1883.702910] ? _copy_from_user+0xfb/0x1b0 [ 1883.702938] kernel_clone+0xe7/0x980 [ 1883.702956] ? __lockdep_reset_lock+0x180/0x180 [ 1883.702976] ? create_io_thread+0xf0/0xf0 [ 1883.703011] ? ksys_write+0x21a/0x260 [ 1883.703031] ? lock_downgrade+0x6d0/0x6d0 [ 1883.703056] __do_sys_clone3+0x1e5/0x320 [ 1883.703074] ? __do_sys_clone+0x110/0x110 [ 1883.703116] ? rcu_read_lock_any_held+0x75/0xa0 [ 1883.703131] ? vfs_write+0x354/0xa70 [ 1883.703154] ? fput_many+0x2f/0x1a0 [ 1883.703174] ? ksys_write+0x1a9/0x260 [ 1883.703193] ? __ia32_sys_read+0xb0/0xb0 [ 1883.703217] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1883.703235] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1883.703250] ? trace_hardirqs_on+0x5b/0x180 [ 1883.703275] do_syscall_64+0x33/0x40 [ 1883.703292] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1883.703305] RIP: 0033:0x7f33add2bb19 [ 1883.703323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1883.703333] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1883.703354] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1883.703365] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1883.703375] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1883.703385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1883.703396] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:33:44 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c512, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:33:44 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') fsmount(r3, 0x0, 0x88) openat(0xffffffffffffffff, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:33:44 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0xff000000}) 05:33:44 executing program 4: r0 = epoll_create(0x7ffd) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000000)="80c11db8a5148200d895fd5b4828f9e2b2b09257a2bdbe4917cecac8b62689c6395c08c27e551e9b535a4200e6b103217590f99e31a0d36846b474929d8a9bfc83f86c", 0x43}, {&(0x7f0000000080)="643c24f0e134f1033f7bbeb877e3d83f", 0x10}, {&(0x7f0000000100)="b5e3e3abc4c35f512260baad026e7e35a546435741eafad21c602706fda4d638dd5c5eb27dd5501a0b78fb1fe2531a61f1891839648341f213eeaac1f7d9e383e0323104139dab837ee8ad1e9712c17fc1a26a16cd2393ec63f2bdb7e12107c24b06eff7a95094314c5f985c039f3ad5d18953a042a61e5752ab", 0x7a}, {&(0x7f0000000180)="faf08242c0e930c47aa15d3a0a2e55420a18aea7224cfc709589", 0x1a}, {&(0x7f00000001c0)="26fa01a2bd3dad59a5f35fb37d8c4a4dec6aea994063b03295d79f609d76b9d2c05d69fbfff23c4ad4183167eb9d5b430d4e4e0cbb8675534379a338ed7bcabf43fdc0dad75b0f779d6ed0a4bd86b3a65efded890da7d216705f067e87edc882555b8625ac0ab9635be3980e809d9fc690268182480982e623a4a042384a4515fe6796d73aa7e541fd1be58eea2d4bcd311f9746d6e5149f90387efb5157f8fac1951aa8df03ff3074b03d044ceaee85c9d1c7321ed16bf1c1a5c43b219d171af57e1ba15db7ce098eff4eb92790f186a059ff", 0xd3}, {&(0x7f00000002c0)="5232e8e3bb348613c0c24617a8327d5bfb4cfeb51fd4d7c301dd683678e5d371e65f68aff9a7ab7e9eb9b159023c1e9c6d808ac115083cb3c7aeabaf06f6a60a2872df45af0d06b9496e1dd1cfc9d7b4204192c25613af7c309fe5ef651df5dba69990af318813f21d7bbe538fb32a61c5f575774d3a097b36ac840de2405e262cfa04d10d3f63a875434c845ba123f61d38e9a6eb49fe480b802869dd86fe420814ab83dc7ac03130f6", 0xaa}], 0x6, 0x8, 0x5b53) r1 = socket$netlink(0x10, 0x3, 0xa) close(r1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)) 05:33:44 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 99) [ 1884.243731] FAULT_INJECTION: forcing a failure. [ 1884.243731] name failslab, interval 1, probability 0, space 0, times 0 [ 1884.245747] CPU: 0 PID: 13106 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1884.246878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1884.248223] Call Trace: [ 1884.248646] dump_stack+0x107/0x167 [ 1884.249250] should_fail.cold+0x5/0xa [ 1884.249865] ? create_object.isra.0+0x3a/0xa20 [ 1884.250603] should_failslab+0x5/0x20 [ 1884.251211] kmem_cache_alloc+0x5b/0x310 [ 1884.251871] create_object.isra.0+0x3a/0xa20 [ 1884.252581] kmemleak_alloc_percpu+0xa0/0x100 [ 1884.253305] pcpu_alloc+0x4e2/0x1240 [ 1884.253927] alloc_vfsmnt+0xfd/0x680 [ 1884.254536] clone_mnt+0x6c/0xce0 [ 1884.255127] copy_tree+0x3b0/0xa60 [ 1884.255715] copy_mnt_ns+0x144/0xa00 [ 1884.256274] ? kmem_cache_alloc+0x2a6/0x310 [ 1884.256921] create_new_namespaces+0xd6/0xb20 [ 1884.257595] copy_namespaces+0x3fb/0x4f0 [ 1884.258226] copy_process+0x385b/0x7800 [ 1884.258835] ? __lockdep_reset_lock+0x180/0x180 [ 1884.259536] ? lock_acquire+0x197/0x470 [ 1884.260148] ? __cleanup_sighand+0xb0/0xb0 [ 1884.260794] ? _copy_from_user+0xfb/0x1b0 [ 1884.261419] kernel_clone+0xe7/0x980 [ 1884.261956] ? create_io_thread+0xf0/0xf0 [ 1884.262583] ? lock_downgrade+0x6d0/0x6d0 [ 1884.263210] ? enqueue_hrtimer+0x129/0x270 [ 1884.263857] __do_sys_clone3+0x1e5/0x320 [ 1884.264470] ? __do_sys_clone+0x110/0x110 [ 1884.265119] ? recalibrate_cpu_khz+0x10/0x10 [ 1884.265843] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1884.266665] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1884.267526] ? trace_hardirqs_on+0x5b/0x180 [ 1884.268227] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1884.269097] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1884.269879] ? syscall_enter_from_user_mode+0x27/0x50 [ 1884.270710] do_syscall_64+0x33/0x40 [ 1884.271311] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1884.272140] RIP: 0033:0x7f33add2bb19 [ 1884.272730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1884.275618] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1884.276804] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1884.277914] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1884.279054] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1884.280149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1884.281262] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:34:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:34:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x3000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:34:02 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0x100000000000000}) 05:34:02 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000001b80)=@IORING_OP_SENDMSG={0x9, 0x3, 0x0, r4, 0x0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000480)="df9aa6f1718b3f8118aff4a2b0e0a211bb2361ba88ab1b5b765ff71335243cd0e446e600131f95012b01328bd11fa35417e1ef49d3c2e67e4d782d8d2e6687245e00dc5479c85156d1b429008d26e8524847a8cb3ddf634e4c28483e8c8b546315cc729e40753ac59e0c41e1cf756d05965674734a3072e5b783bfe61657a79880badddd55abd65c33099ccacddc8435dc96fffa8119995b7d8fab4979019bd06a489c69799a483c5559c811c75778d0999ca47d7089dc2148908be2cf1f160deeae5a50ef62970f3d18f5e6c247111ba369fb5a2ad19b5a27702f3580b622d034e213edbc9b98", 0xe7}, {&(0x7f0000000580)="441cd5bc5b36f492f7a569004b7b1c22c207baedbe5d979f33e40a5d9621049dab571f0c494a5a6960aa14ca82da0e644c512bfe3d62", 0x36}, {&(0x7f00000005c0)="52430f496633aa2f53", 0x9}, {&(0x7f0000000600)="61d854f645e943ce6a522810a580b4e70f058e", 0x13}, {&(0x7f0000000640)="488dbf1184e9b0a99215f886cf9b3c8c962d02d32d5716d4114cdbae1962ef3dda927f82cc594786bc8e1722948a22bd8184659b84849d361a857b44d523408b2d44cf350d58bc164f3c2cbd731bb021e7", 0x51}, {&(0x7f00000006c0)="5bc7f7ac0903a86e2e296eb152cda1fcb82a0bc871fde73e3db6b6fa4b0c6edf60baa027e9b542a530882d4bfc16915ed02e66fd581ac8edb80fb9e24e0e342eb3ccf721176fd06040def528fdeffd67f2474253a9c03159a4438b79", 0x5c}], 0x6, &(0x7f00000007c0)=[{0x60, 0x102, 0xca0, "18e1497dda2c92acdbfd492d6e6199fcb0101563aab186a3f6b2f6103ee075b02688c534296867d07ce8435ad66e1528c6240a548f0478cfe6511ee5080fd19a27c889f5d8dbc65bfab8a874a7f9b6ae"}, {0x108, 0x116, 0xfffffffe, "922dc00cc8cb1746b1c7d008f7772307fe10d4eb9a583508de79df8f6bc38d725d09949d425382af66cd1056bdd96f9d5c341ef60371ac9248629b87239e739a2d99c79478733d5a3f855b541e955b4bef16f9674e14a119ca45f6b7961dd513b3b0dbf62c3410ab7b21428a1694ef4c991aa3d25ebde2cd141eb644bda5f19b82cb956464b9aa413ecb7e9ad3a54d4c675f3a5f0ec2586c8c133cc044ef7a2a7af50ebc25c24b42ef554bc257074e7d9d53a88f0c2d3929da09bdfbb2c3e9ebf888be51fb94c04e2e589074ceb411565f0c990b464b81af36645ee81ef24c1d256ec42ab0c189444098acda342b1c46b0ddae79"}, {0x108, 0x105, 0x3db, "c694d45df2d7d4d74ba626abfe19fc0634dab249086217fae4bf69b30ecc8a2b7e2465c6544f7ee010bdd4d77773900ba4e9742be3bc6f3f9031be16321344193896fa69c8d6532aa6751188979c30666a710a6551063742e09423e6248c7c732534f8a83dd39977b09aac30ffbe79a49b0f3321bd5b2e00a28d17db6ddacd93fad1ae0e9d7bb74bed44079c05c22ba3d74dbc7b90ceebb2dc635525b61e053242d6b96730ab080731302ba3aaf572ac0c49f4ad2580f48c22bf98fa086fba54cc8bd6a40741a1a00ac9ee02fb4fb18b3e8572963e02c1083548e9a27ea7b292de23a6c268f93d3a9d58157e3b973a58192ccc71d060"}, {0xc0, 0x10f, 0xfffffd0e, "4188b4255bb4d96f0d5754a8bca5133e6887fb5f10db4f1366e978ef773489b71d8bde1eee13f8b7869c717d9d0a6dd626eaa5a999b3adb33ece8ac34d5d1c259a6b9f6ab10d1b551c908e932d28272ad49e1f41ed27d9599f93a88a716f1a3a3ca09078e9739dc5b3f840009792013ddb15ecfa60007a40567b5213386c6740b35ea0ad35d67a76f5fe6b0695fe47d632f42a8948838df85ae1c0ff233cd375f81cff53f62e9a1c6db5"}, {0x28, 0x10d, 0x4, "ddac4ce6340b079b58e30e51f8deb26eefd4b6b14c2d5f45"}, {0x18, 0x113, 0x5, "ba81952357d98b"}, {0x1010, 0x6, 0x6, "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"}], 0x1380}, 0x0, 0x20004090, 0x1}, 0x9) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, 0x0}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r5, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x5, 0x0, r5, 0x0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="e6994d3bbb2432659aed345de7b851f2917da0403717ce9cb4f402efd14874ea551e4af97de837a7f35f8f5e5cc007286aac2e68fc3d06ec4233021fb9b965c75358cee06f1d98f3b889b3e0b757bc46c8fa11eb03dde944e2d54ce0cbf0c95af0ca0ace5d0ee71111692869a13bb28b7e0a42c7210258a0446044f5a2405e8558bc2e9ddddd88972cb09be195d089b6544e25da412f351c247edd8b3b32e8c936cd4d68525ff13f2dc60772a6c57ec84a906335d9e13d8bf180b8197fddde7a3cd1ad93c7136422c71d1a0d546d07dc931c6a8acac9162845f31252d5bf70f4f8bd97a0639d091c11", 0xe9}, {&(0x7f0000000000)="486d4d3b5bfa8fbf2622eb1227287e300b8fcce5152c70096516eb70", 0x1c}, {&(0x7f0000000040)="85238ca7a6a67aa6a0b73d8241b4ad9299007a8c3993a2adca3748517cef95a5c673990c3ec44c9807fa3df9ce", 0x2d}, {&(0x7f0000000200)="83ce74b44ff963b96aef682a6632264fb59686f31f8a264b4d3fbbe6342faf4a187e8ff8047cb4a6342e2c05ae388450db34b05b7b0b4bbe2eb7332fac6271f128e61df4fc91982e19a344bfa899cb34442fe97cf49002efdaed51194536b154e9e1f30e21fe3a1af685d8858299a6ef67b369a7bcf8f2c3ea4a10aa7d1da7079c2a439b89d0c3942d6dbfbabbe3282482b51d4e474527e91d", 0x99}], 0x4, &(0x7f00000002c0)=[{0xe8, 0x118, 0x400, "58e1466ee34d0df65bfe26ca088ab346046f34c83775d486ad1000f79c5f74b14c3ee437f1fa5dddde2f383196df4c2fa2fcce14a9fd9a75b76c13502d9eb13ff3a243308df2e0d1e3d52867eb5bbc0e9e8fff22c7505b3ef10fedbd4d7020a2edc63a170066c43a561ca1a4b8c0e6678a4345d5fdb91ebaf09e9c70dab8d761077172218122640c31d1cf8289811cf5dd4cfcc9b9a33a732124a99bb19955443b17efdb230cf1d04ee9ee465fa9c0002b56aa3101db9bebedfd94b0cf4d5fe25ff78645d2cfe9920b409e3ad71c10261dd36e1c6858e687"}], 0xe8}, 0x0, 0x20000811, 0x1}, 0x645a) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r6, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f0000000440)=0x101, 0x4) 05:34:02 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') fsmount(r3, 0x0, 0x88) openat(0xffffffffffffffff, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:34:02 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) [ 1901.683100] FAULT_INJECTION: forcing a failure. [ 1901.683100] name failslab, interval 1, probability 0, space 0, times 0 [ 1901.685042] CPU: 1 PID: 13134 Comm: syz-executor.6 Not tainted 5.10.209 #1 add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c514, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:34:02 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 100) [ 1901.686140] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1901.687457] Call Trace: [ 1901.687842] dump_stack+0x107/0x167 [ 1901.688372] should_fail.cold+0x5/0xa [ 1901.688922] ? create_object.isra.0+0x3a/0xa20 [ 1901.689583] should_failslab+0x5/0x20 [ 1901.690129] kmem_cache_alloc+0x5b/0x310 [ 1901.690708] ? mark_held_locks+0x9e/0xe0 [ 1901.691302] create_object.isra.0+0x3a/0xa20 [ 1901.692078] kmemleak_alloc_percpu+0xa0/0x100 [ 1901.692732] pcpu_alloc+0x4e2/0x1240 [ 1901.693302] alloc_vfsmnt+0xfd/0x680 [ 1901.693853] clone_mnt+0x6c/0xce0 [ 1901.694373] copy_tree+0x3b0/0xa60 [ 1901.694919] copy_mnt_ns+0x144/0xa00 [ 1901.695473] ? kmem_cache_alloc+0x2a6/0x310 [ 1901.696114] create_new_namespaces+0xd6/0xb20 [ 1901.696780] copy_namespaces+0x3fb/0x4f0 [ 1901.697375] copy_process+0x385b/0x7800 [ 1901.697959] ? __lockdep_reset_lock+0x180/0x180 [ 1901.698633] ? mark_lock+0xf5/0x2df0 [ 1901.699194] ? lock_acquire+0x197/0x470 [ 1901.699797] ? __cleanup_sighand+0xb0/0xb0 [ 1901.700433] ? _copy_from_user+0xfb/0x1b0 [ 1901.701052] kernel_clone+0xe7/0x980 [ 1901.701599] ? __lockdep_reset_lock+0x180/0x180 [ 1901.702280] ? create_io_thread+0xf0/0xf0 [ 1901.702905] ? ksys_write+0x21a/0x260 [ 1901.703469] ? lock_downgrade+0x6d0/0x6d0 [ 1901.704079] __do_sys_clone3+0x1e5/0x320 [ 1901.704670] ? __do_sys_clone+0x110/0x110 [ 1901.705300] ? rcu_read_lock_any_held+0x75/0xa0 [ 1901.705973] ? vfs_write+0x354/0xa70 [ 1901.706524] ? fput_many+0x2f/0x1a0 [ 1901.707066] ? ksys_write+0x1a9/0x260 [ 1901.707628] ? __ia32_sys_read+0xb0/0xb0 [ 1901.708231] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1901.708991] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1901.709738] ? trace_hardirqs_on+0x5b/0x180 [ 1901.710378] do_syscall_64+0x33/0x40 [ 1901.710921] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1901.711668] RIP: 0033:0x7f33add2bb19 [ 1901.712213] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1901.714848] RSP: 002b:00007f33ab2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1901.715955] RAX: ffffffffffffffda RBX: 00007f33ade3ef60 RCX: 00007f33add2bb19 [ 1901.716982] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 1901.718009] RBP: 00007f33ab2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1901.719046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1901.720071] R13: 00007ffd75e08a6f R14: 00007f33ab2a1300 R15: 0000000000022000 05:34:02 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0x800000000000000}) 05:34:02 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000002200"/20], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)={0x80000010}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xa52102, 0x0) 05:34:02 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x0, 0xff00000000000000}) 05:34:02 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c515, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:02 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 05:34:02 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c51c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:02 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0xa03c2, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) 05:34:02 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:34:19 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) dup2(r1, r2) 05:34:19 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x174120004, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:19 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, 0x0, 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:34:19 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c524, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x3100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:34:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:34:19 executing program 7: r0 = epoll_create(0x7ffd) r1 = epoll_create(0x7ffd) socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)={0x2}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f00000000c0)) dup3(r4, 0xffffffffffffffff, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1441491aa000ba38400000002200000002000000ae5c959d6feb37735993f3d12d73410554f97b4a10338415d6ccfcc2f90255eab9e5d3f4e8e30683055555bd54fc28f3a611f22b904a01000000883c36904a7c8c"], 0x14}}, 0x0) recvmmsg(r6, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r6, &(0x7f0000000100)={0x90000002}) dup3(r2, r1, 0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000040)={0x2000}) syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r7, &(0x7f00000000c0)) 05:34:19 executing program 4: epoll_create(0x7ffd) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000000c0)) dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 05:34:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006500)=[{{&(0x7f0000000100)=@nfc_llcp={0x27, 0x0, 0x2, 0x6, 0x81, 0x5, "26bbf96b5e7688491e1c6c8df386ee0656ad1d28806aaad9f0fd733994fd198bfcc4d4e4da9c37c5f1763e8feeb0cc2a0fc1e4d91239a72649c503683b82a9", 0x9}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000180)="cf2a14861e82155f990ef57a75a95c2a05b66923ca89aa64e30808f97230e4c99bc87e0c857e643a1c6cdd6b025a20784715af0ed08494f4f9d30fb5e3afbc0403613041fc6aef1af90176ffc6b07c1e7f32f48040eb20400577e5ad7b0a2f119f24d59db6d6c962e64d9e335919160eb1288b4c0f7b1e206ea345a072d558ec97384909df202cbe4c4c3cc7b063ef7726d4e7cb3865a3ba2aa177e6c795d169679118e4", 0xa4}, {&(0x7f0000000240)="26beabdb036d72849a8b8446d3327154dee4e7ecbd8ee2d50a84ff2f52256a4fd6ccd9c6b5e0fc41ae6898d27774de03c58144deefb95a8a557d19a26819e07a6c7ce678689113fdafd5317fa5511dd29e30b790f367b6e2107c70d9145e7664580ab5dbf281324a566130d4863c01bafc6a675557fa46", 0x77}, {&(0x7f00000002c0)="abfb5030f6caab8b6209497b335c0749c0848963d76f25dbe4e73b7ddc4f92c4a3e06418be18938f4084f7c09ae9911585b8d2d164f2e4f0e2e95f09de2416e5ffb45557bd1bd101f2ac2389bade8254bc9685692b912ed7016d65236dfa86d94c70e8adfa7c4ec742d73bb9bbbc57096c5cf4d7f90748079ac4388e37068f2622a5fc60da6a490e1e9a1b671728f22a8f14df528e83c9973736ed90cfd22a", 0x9f}, {&(0x7f0000000380)="0881d045f7c8daa25fbc2974bcb57b7068357720d955c44914072f9cfb7249a2c2f0b15fdcf7414e0c065b050406187a8064f1f7504c3f65015d8255b7fdc76aeda268ffeb5cc50f04d81098386a4496950ec9d5dae153d3f85f0e26d145678782a4648225a7435753cb34dbc3bb2aa8bf2515d167e351547f870b220cd474cf456d3de9a9cc022dad3fe618d23c8cffdcda05edca6cbefe4af6933eb9bb290bd754e6c38cf2e55d5f0965082acd4e23", 0xb0}, {&(0x7f0000000080)='!', 0x1}, {&(0x7f0000000440)="ec1f536d83794ad3c91b", 0xa}, {&(0x7f0000000480)="ad9ab56d6fbf43e6419c895a406c42ee7622d7f8baea76c0c0b839ad585ec71400497d9a8be80a5585c11ba2e5e8811b6fc1f4cb16259729c816ff2ccab61bf16a17356a8f06a7de845312eac083a0f0b49b0d7b143415160bf5ff84508861356c25928cf9", 0x65}, {&(0x7f0000000500)="c2d05a15db27946b897e6f2715a2d7c56d951efc2cbfdc17b6fc2842d374e21ce13c449a9d5ef746e4d348829ee6ae1a1d389996bbff5da0a1b4a709b3f5a0bc8f6917dffb61a8290369853311ad558959dc5e92c2a09f824d4d5bbae59285bbf83e5319216340dc1a605cf6956321f6954315a05d533e5df78048b1807d40e9a0e990b047d80fe22ef3483d57a5cf08a7d5c89f5475aaadac61e3536753b075cd39ce5d2df274", 0xa7}], 0x8, &(0x7f0000000640)=[{0x100, 0x108, 0x9, "73ff85d57eb7a7ceb954d408d545710c7fbd51ab04e333dca3690d213b857571f9a204521d626e1854d004197d84ac8596f64749c86b849a8dfd002db8d0c3fa97baffeeb8f6724935d0f16c207851f35c498faa3c07e9cb1a307e86cee4755676b691dd7aa8198a8f2ccbcaeffcaafe4ebb42a5aeed3215d3a3470ca37eec4c1c6da4ee0fbf76a73fc85b6ad098a901cb322036f665fdbc10e3919c2fd80cd9d0adc0852145b792396cb35a907157dff7b397f0ce8cb35d1768e83cb9bfa841bc8a632c38e07060cfa5fc5a61d9d9aaae2728193f4b5340108ea3112f07711355ac5b358a724b9b088c8192c3"}, {0xc8, 0x101, 0x6, "62db7376bd49420914ca6adc1dbf44be2f30d065e21237e459c779ec50413db6f1c44c938dc3ff5048616581dd9dea4192e6097237ee89a8f451fbc3032c274e8d6cc2547d64504ec78a645cf4e47ed9f459d1e442ca412b0366d9a976108fee2d33ac90b1255926aa52235e90f4baa275b424860447ea875b3ff7d1019f6f742fb0275593e0ef2975b46aacacbce457c21b7a82cb5fb568adcfbc5e598a1d3a8adc54de6760cf1cf98a2d688c5c88f2f634088b54"}, {0x1010, 0x6, 0x7fffffff, "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"}, {0x108, 0x115, 0x1, "c60632417c851e34238e50360dd8703bae029b31e88124552622ffa4ca1342df384931631c0b1184e9cbc1879232c082d6e1d71583cf1cf7bb5c94465b59ff6d5cb0bc400503065132b2b540caa12710cfa7469a7189fc188b2fc7341383b528248a2534583f5f5c5ed5d491cfa8d90bd1e7dadb4bd743273c964081b2a6b7ec56020a92cd098ce2eba0fed728e563c863c0e07fd9a22fd63923c064a06eb039b3bfe17c73ca345f4611d02efa1343778791ec4e3e8726798aefd7be68417f5c9329ba0da8edc62e6f5079959c939f9f37053e95e3e87acc7601eb7043680202d61a92bf96a89517ae60fa4e96a1373cdf6f8f7f2b"}, {0x1010, 0x113, 0x3f0d55ef, "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"}], 0x22f0}}, {{&(0x7f0000002940)=@isdn={0x22, 0x9f, 0x80, 0x0, 0x4}, 0x80, &(0x7f0000002d80)=[{&(0x7f00000029c0)="93bc42380b67714a25d5cf4f3c9a4569806c9601687679d38ef5b5c24e5211324d9faa3795aab6ead4d5299e71aa1cf66ff4386287f132974ce736540520108672a7e09452bfc97f744a7da3ad644b1e4a8acd4e79666aca235b9ebf2701e1ac08f3634eb69da323e277f3f7174c3901e33dd244", 0x74}, {&(0x7f0000002a40)="80c11e186c086d887c601d7360622628c17d7a62aed327bd71ed8128eb8f5b7bb5be68d2e6ee963a2765ee92bcff02dcedabeddb5405d54a0d109488820f52cd6d4c6a950eceab01141b38f7ee4f8f22cfdd9211a641e2afc3ba3b5ec0a628f836d5892c2a84f40a6d66060bce8cc61754fa6f18ddd447f614deafc51004b300139fa4aa58c72607773b9a7da2da28c79a1a019a1b9f143d645c317e4bf6e11dba668a0438f6e6ee036701515bc6d86f351a80dc5135770f008a7ac0acf60799702f5a0cbaf566eb834109ab516c18776da0394b620024a6ff5dc9476475dfe4f949d76870d42062f6a45de5b816e7d8", 0xf0}, {&(0x7f0000002b40)="4ccbcad1816f4533ebd4a172963edc382fb0002239ef", 0x16}, {&(0x7f0000002b80)="6efb35b7604b5131149c3e00ddae76f6400effac1b743a50da066d36197b3dfc57eb8f6b506b2c326709a0a5d013689cdc8e4871a9665e890225191f9e1d1076688fa67a2161a9ec10d6497d002a99c14f65e94a75538aba6c777b9486157af0546d99a290848e7210f6176e772b7e297e7bf945ece1a06fa2fab1ed565eaf0a5cc02926c5f4ff2ce61eed39014932a201", 0x91}, {&(0x7f0000002c40)="aa45d1b717a82c2aa59d71340b5915145559a0d9d8197de278f0d121582a0e3a4c16ee8575e29a16a0af21caf0a9490902c92a6a3165c8b71040b4f694e260be8a058e6132ba77993abca00252cce6290acf1926a40a198ae3623b5e4d", 0x5d}, {&(0x7f0000002cc0)="66c5f5d99a1edb03cf0ff06a807e585d6a1306d6a15b1c19a9e394ff18602ecd044882a63634adc572848f0b4800d87f2166f1ddfd3f528b81a4488b75bd565a8eab09ec5969ea4daec376b6537a316c54215955a14e5f1b03dbf055178a80263b407a16f57d5ec5de1e9efa23758daac7efb6398e9434ec82083e6680afe94e60f9577560a6303ed365bd3a298157e6f0d9bcf5747745bffeebe63119af8d97722f890dfa911f0155394020f191546f3a3d5678f9f958efe4e1fc", 0xbb}], 0x6}}, {{&(0x7f0000002e00)=@tipc=@name={0x1e, 0x2, 0x3, {{0x1, 0x2}, 0x2}}, 0x80, &(0x7f0000003080)=[{&(0x7f0000002e80)="4f7431cea3a95ca9a7738332586c40f3aabe57d1bda9fbd98b9faa0047f8dbf56c3aebf934eaa19094d3521c8bf81df1e4b39624259fc5d5e7a1460f122ddc8e4acf9c618718c98dc51fc0cc07479f5ab28fe66c31d89c6d3d94e5a65bdbac223ccbf48027e4d1c9f8ce62b21ea24830de8901a25c952699a5f7d5b62bea5a92e1ae4a58c6106f498c510a55c3874e78a06c5e504d42e0728d718eb2347d3c735414de082321a91e01409040fcca4e68bf049651101b39ba8d2bbe7e014c00513b0299c871f3014c4f63be1b8e97e3dc0e614ec1bf29aff81b1c9ae3430f202ceefa9085dadbcac3c5f7c3ef748ddf055fd2509f74", 0xf5}, {&(0x7f0000002f80)="785196c1743a9a16c6a87a1ca6642e44d52bd0c60baa300da45ad1f1f8c96f50a8d359a11f926e89254cbf8a711b5440ab43b6532c719d7866a146440f4940fb316eab6b9a6d710ec3050bc0325fecdbc36c1629a928cd8cb015c045aa911b92b82f512594be57e00fa924c9ccf062a1fc9ec69f1ef41568c33f1ec06751eea1e21e736ccca885ab6b3cd7313217fceb8e7e92f3922fba6a824c2fc9b1237b834f63f26572dc30310da085bf7e1a4629f433a8c25ff9f0c002605ddee0a3420f10df3dd092874bf2b14a7953a86aa9e4c3", 0xd1}], 0x2, &(0x7f00000030c0)=[{0xf0, 0x112, 0x1, "4723a6a4040c7aaa9abfcc6378d941e664ef723111184209ed3ecae81d051385a2b979fe865724610fe743c5520088c237da28eeb23df1b20d00d401d1fc738d550800cb9f480ccaa81bf3d674807f8f3c9edab5cdebc021e7a7ca463e50dee1569197233cb0ab1c567f74987b7b955b321f80fdcb788e85b5f00a64b32a029594a80a8fc6d203581e1d00e1e363ef073ac2053b62aa92d5b2029e667ae172c7c9ed41a69f0e97f9e982a3ae3953ab09e28375353bfe65e99a6a5e0161fcd0f8ede38dd58ea4216fbe053a1fadb6e27bb140a3102ff9ac1237e3c1f40cb6"}, {0x108, 0x1, 0xfeee, "e085c3b16c3bde72915b72dbb72a7cb2edd6e8cf044edc9930b012c3e1dc73134b1b246927d374b0fac894c8223a2b2bb3c51b2258f26100e446967e7c4253a9f04127bca4a4f90a3e822273cacfecda17631bc17cc505e76cb38af20449026eca43ef75daa46bbfe62ddfefa6b67c429834a92f8758bb759911fae14ed5a15acc192ba8a51b895a13b13e8a21b551c438ef52772cab7117be40b2299c7c9985805a8f30d96ad3db55d27c3365c278d2d3db2d5e58e2965fdc813c005fd74e5df0ecfdc7087531f8f9cc8035715023e9f3489ceb0413f121a0d56bd7f85d6f6ac2935cbcd4b050a3ff37cdeffb6e1afa655747fe0d6970"}, {0xd0, 0x114, 0x6, "d8a7f9bc83238479f8f8b474df6cabb748d6b2534f5951df5d04f886236653e320eee4bb92cd6f8cc3e0cd2d6328a2ddfc3f9fec773767166da5c4fa30dab0ea32df624b4c260ac3433f863f7fa2b088d0e46accb48337dad10a6e657b19662dbfcec4a6403f8b0ed50184b6cd3b5881c4213798814970cc60d77aae731af51bd91a0e1ef989cd8ddb1be82019bebf60df9ece621e1a0fb238124d72657aa4c5c0b28a5255992354b0f2c02a717e6a81f4e7e438da357323629c254e59"}, {0x1010, 0x101, 0xf44, "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"}], 0x12d8}}, {{0x0, 0x0, &(0x7f00000043c0), 0x0, &(0x7f0000004400)=[{0x1010, 0x104, 0x8, "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"}], 0x1010}}, {{&(0x7f0000005440)=@nfc_llcp={0x27, 0x0, 0x1, 0x1, 0x7f, 0x1, "8ddb09ae31dbb55fe59cc4dd8790ded2bba13dce08f4740c49393ca523861c5ca28d8dc77fb11b88b652403f525c32bae71c1139b3a02767004d90d1b97943", 0x1c}, 0x80, &(0x7f0000005680)=[{&(0x7f00000054c0)="ab97addbee17feb72925f3e8ac1c387fcbe2028f3d12096fc5b59870805b4172d631213d3f320426ce1ed5402d543186c3982b6c7c7c066a527a8bb5aab7266e", 0x40}, {&(0x7f0000005500)="30eb872fb7a99634012620428b58c7781566d3b846a61160a578ef8bf325c640066cf537d7ac384eb4bdb3d11c250e744284259b1dd84241da54cbeeeafa8d1cf3dfa0c2dddb8cd49dd1a61181f38db73463d0990d941a74785d771d7f8fb7d8c3c5df1ca01f409fd3021320c8cb8fa0cc78a56411d4bfef984556351ae0142c7008902825a7909b50ec8e1fa36c1b268b2192d4a50bad5a69e56782a92265d5dceffa23b1c15d6657b36c1c36", 0xad}, {&(0x7f00000055c0)="c8b3e45b4b33882794020d008ce3ec785751d2cd4c96baa4db7288e5ad46797356ecbb8926f680a010956ba1a395d0ed1e30f337b6f73cb1563ffcb4873c80b39d9bd6599f3414fc43155c6d63139e535471fba58ba6367f6ba377676a6d3901c78e55d5ef4dbc2897467ceab7b49264309981134e037604e338ea37af860a3707d065fb4680e7", 0x87}], 0x3, &(0x7f00000056c0)=[{0xa0, 0x117, 0x400, "4069193de55394411af523ee1c08484cc5172a5ae75b3d0fc4d02332a0a168ca2f2fb1d75f7ff3801de4ef40b0a6f51fba5add82b5d3deafa3947a16d9b3af81dafb8c68db06e905821c0630a0e2ada7b2abdd3382c37ed0a586d9a57e0c2cccd58db421f674d24e29601622b218f25e96370393805a94e86afa128ea6800b91c8b6d98d224dc9d1cfd80532"}, {0x80, 0x6, 0xfffffff7, "3e244c2ef8298a921b6a8cea49d211c42ab12c90acbdbab76713c467a97f3c06e46e3b9ab9ac100d405b7bfd90a52e26dc5741560f2735703e914faf21e9b713021b15f0de8d0cff1440a4d4b37efbb599b721a143a3f1d9039be7853e795d0de1a8477639d58bca6456270cff"}, {0x38, 0x88, 0x20, "17f614d06354a0e9ef4be0ab1ed3b1df80c73e4a9c73b30488da36f6eae7487a2bd4a7a062"}], 0x158}}, {{&(0x7f0000005840)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @rand_addr=0x64010101}, 0x3, 0x1, 0x4}}, 0x80, &(0x7f0000005c00)=[{&(0x7f00000058c0)="1264e866dbdcdd3dc147a6fac0c3c435c38433282765dd8f39d0575d3142f9fed352ad171286f3001c24f1eb8bdd4ac5d0c5d6c1aa3483e4ff630ed19211dc3c496d055cd6a727e9bf699672f33d8b", 0x4f}, {&(0x7f0000005940)="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", 0xfe}, {&(0x7f0000005a40)="bec3ea05ae5bd2b342b2c662f67860b20551150992551be0bcfdef3b1a2a693299b7adbe72dbe46c9a9542a9fc2f9510b57e6147d5c9f975b65734f89bf8c6e5c6d8dacceebde6b5ff337e0994556216508bf604e561b8b13e8d7b6cc8180f7b4a1cdf40cf7b61da28c957817c6347e5a8ca4411bd4c38c2849a77dd3de2ad607151d13c007f826095e07d9ce894e62f1d12bad62ced1583c065c75914f950e59ae8676fb69a834953f170477b2df229684823fc67a9", 0xb6}, {&(0x7f0000005b00)="47be8cd31e76bf184e2a36834d1a7682826ba5d1079c10cf9570dbd045e921ae1706c910513a3b51dc4d51e2387556137049ceebd0bba615b0332c9797d684619335ddd831a55dac64f05c77a2abbe257412cab3243854919ba028c7f601cd730576fc267bab88da6a2ea44363ac7911fef7ed0f6dd7814420abadda96cdd0f777df087ac20657baea02454738d7ca07c733714209fe22bb6d00c38c575359a83dbed7ac93724a2d146607a6639a5ff598e208c788ae17dbc49724d36c1b16e3ed786f3ab7", 0xc5}], 0x4}}, {{&(0x7f0000005c40)=@ll={0x11, 0x19, 0x0, 0x1, 0xb1, 0x6, @random="56e9bc479e3c"}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000005cc0)="51103bb2d9dca09e13659a32ee15070d1e688a83ccd904cca6185abb62bcd4dab6ce2b45a6ebc1708c8ba0fea5420657aabf92e1eb752c0a906851a5bc95f7ece2a0214e5857cc68b1e40e30c9", 0x4d}, {&(0x7f0000005d40)="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", 0xfb}, {&(0x7f0000005e40)="c414fe9c774d3c6eda8ccd783d232a19f8b6e4f7a98c9c5e8311989e4320d2bdb37edb4100fb7bd72217c56312ffc69de2bb2c1261cf2331a21f142d24f730f473fbbb8f9e6b12cef0ca8ab989ff5727e2b2adcafd7f247f9d02f6ca85ec89bc8b5e17aa6c01e867283cb7df3f0bd08cf02e47eafb5be0d8b94d99574d1c17fa85525986ce3aa5202c7e9b826bc530fc951fe2cbe7615c083b545454d2e36909b2ff", 0xa2}, {&(0x7f0000005f00)="5ea0cd88d02d8b2e1137a6278258cd7d37810bb102c5af271682b68591d74a0d86b7019548f839f4f2a56eadaf143f4fba84aef18378", 0x36}, {&(0x7f0000005f40)="ecf9156b16c0227cc61b44971a0d6ed48ed7f578251864cc6ed9032f21e8c106ce83c412a61a6b527b1db574fd68b405a5e8f015243a4f502add0ceef267ab2b383126171e6e7b7566a02a2a29f35aa5dca698694d0786a6e73d47aea36561b841cdf58d7abef44c444f3b338766d2e08c28e1569bdcdef6c2df36a1ae99e95213742273ec83ccd8b9e226cbfe9a7050769f4fa962ac7d955f3a", 0x9a}, {&(0x7f0000006000)="e387662e7269d85993c113887d6a7bcbbf81a57f4320a415f353b309c193e03e8a88586c91cd12cc7fb7f0a84a8ebc0b550dd2c8b270293ed2cac8017af13132602a15a4b98921213c0baa33a830f6842ea3e84743736a384af92ce5c197a1b798ee44ffebe64af23237ab7cc7044f684c0bc9cba640e4f599ca22349fd1f0bdb1820ea55645c0b0156097b269d77fe5f6617968a3ec0d5ba07a198e1bd83090437aaf6826e7c85e385b63e2b8bc387dc5cbf629c8835015c7c87aa31acdbf29c3ca", 0xc2}, {&(0x7f0000006100)="233d642df01885958252b10c43410be4469e08765155ba1a1126408ca00b83513cdff3132a1a649d6c031aebbc146b0c2b066a951069373df3bf6a41bb430e291e2beb62a8f96c8252ab30d4e34e03112e96ebba62e5442b9c7fa9efb6b29af33edc34b35e6681f98b1d9ac78ae07f4f437addcafedc6f464c8487904296", 0x7e}, {&(0x7f0000006180)="88d4aad4b22f2ab6a911716bfba195e7d0", 0x11}], 0x8, &(0x7f0000006240)=[{0xf8, 0x113, 0x5, "cd95ccf007859f4d12403324235e1f41950bc915d99494b4b81c59a33b3075d27da6a95e2bf76aefbc6ffe7becc3bab4cdd99d8d2d4ce1a3636b9d2f0c0de42fed35c3586926321b2463d16a8536201e16d6fb07adf3e012d43c3547145fb7ef3f34991137438e95e7b2e7cd9898595145f64856c8f95ff188c4a43b731211c4cff6ecb974c8cd726f8e0f8ef59145f37367601a436354f7718b5e6bc517f54592234975e60b770961681cb2c5e797e9a6936b3272098f36b430f511918d241bf89ea954df07a6347f5e23e57bd043da7b49dab812aa2145b79b39b784199d55a2c2"}, {0xd0, 0x10c, 0x88, "35ddfd7334514034ed15f7788c98d8996e0b6d4163cd301f69ed68c188cf77cbfe0372aabf44ba8e60e0f37ebdac7bcbb00ea7d748cdca3cde427427afb00df92743a7e47b29f4f9e5e1eea15fa60168733deefbda99d87f8ad359f0ccd3f45427a2586d0d52960bf3b2c51a6a59c9350b0460c92e3f5870a81623a58252de2a5e30242a33db5a782e67d8709950a63eaf9606a65db65fabc9c808a99a9dec7bb5b1dd528c338e57e84ba01e5209a4fa6cdb3cc59975a6460d"}, {0xf8, 0x111, 0x2, "38113e61ae91d72192e07d3f37160de4f798238a8e25b907e20154d298096196a61fa634c2c146a69fb086875494165b3dede32d0ebeb1bab525739885a980a92dc50f12d9f6b1567b8cda3bf0e25408e8d6dc4badb63fc0274d70e6dbaa9ca158fcc6b2754a066c12b13f8111be3cdfa65d1eaa3c87ebfe8d45488dfa1af48985a147a93a822ac7fcb8f1469c4c39cc7b8f50dc23249b8a0013caa1a3fd5a0dfb1871855b6c809ca7c2178ed721bd6f487493f1e31e33e5ea3dc8780aca16cd76a2c2d30d28c470c7e0b2c7b1a704d982552b454a359d66545c5d0a5a0b893493d4"}], 0x2c0}}], 0x7, 0x4000) r2 = epoll_create(0x7ffd) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040)={0x10000011}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x9, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f0000000000)={0x40000000}) 05:34:19 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c502, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:19 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c52c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:19 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r2, 0x40309410, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:34:19 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c503, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:19 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c538, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:19 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, 0x0, 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:34:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:34:36 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c53a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:36 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, 0x0, 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:34:36 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) write(r1, &(0x7f0000000140)="2f84c5b6794f4e82968c7295b8313fd4c02fcea937aebd6b54a015a3a86dcf7c73e36b0aaeac7b62eb322442e985a5442c1d7e61ad6e3427e65186e563f0a45e92776064299ef1b607a11de40c3b2e80c3b28f430ab41cfbf0d8e8f4166d5575420f4054bd04da13d12c70434b80e6746599ec6616cebc79a6803da7be4dc9e3c92fa7fc8bfb117f9c70b7ca0004bfe3f3dcbe0647", 0x95) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv2(r2, &(0x7f0000000100)=[{&(0x7f0000000000)=""/131, 0x83}], 0x1, 0xd12f, 0x7, 0x0) 05:34:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:34:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:34:36 executing program 4: r0 = epoll_create(0x7ffd) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000000)) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000000c0)) r5 = dup3(r3, r1, 0x0) epoll_wait(r1, &(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x5, 0x7) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r6, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x10000000}) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}, 0x1c) 05:34:36 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c504, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:36 executing program 7: r0 = epoll_create(0x7ffd) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000800)={0x223c, 0x22, 0xd01, 0x0, 0x0, {0x2}, [@generic="22db92aa55fd8a53dc8b738aa713ee5dc585783e21fa18132e1fbaed7d62a4b643382e5f92567a77dc76ab", @nested={0x2086, 0x68, 0x0, 0x1, [@generic="69732feeb5b456660459dd6444f6d8dd93ab96c4782b8d60314c437842f4a19991894641a53761ca1c8ee514fbed7d28da482e911f9d527cfa8405199327ecb3044f2a3b5089ce267884fb3f291c94bf071fd94ebff1e665e73f793486d67a00712ad6bb6078c246c712e9674698c501553e25c20d215a058da1", @typed={0x8, 0x42, 0x0, 0x0, @u32}, @generic="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", @generic="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"]}, @nested={0x8, 0x41, 0x0, 0x1, [@typed={0x4, 0x86}]}, @generic="98e436c6b615cf659020e5e4f4f7c61a25d2c90a8b0eea5dee1bea13517f54ea09023827fafffa85ba6e1f6544d526d4a5509a55fd23774bd5205f64d0750d118bb28d", @typed={0xb, 0x62, 0x0, 0x0, @str=')}]/\xc9(\x00'}, @nested={0x110, 0x3a, 0x0, 0x1, [@generic="c34dad71690168b3d525ed0f161f5a6d9f5c4bbdfb0609db75ef310120e1a039789120a2e67210ee49a879693e18c67184", @generic="be4f46d81e0185de93cd9e399aa9bd9791829fbf7f638ce0e291fc59c2f17ce67a82a215c6004f2d2b5c9b7392b9b2de29051e52201bb2d640563555512a4a91a3939c0df8921ec7c05d98a352a87d9320cc342dbb87d3cb5b3758a41214db9d5ebfd8e93ea2479ddf1424d45390ade54b5326a3258056910568ee39bd183a7621c6d7033e931ebe731e005d243f0a823562d3eab9e262a0f53320a151c3524cc677d8b621a1d3abb3415be998b89ea1eac490c5d6972a3e9f9802e06c35bc335b146b95e57493", @typed={0x14, 0x36, 0x0, 0x0, @ipv6=@loopback}]}, @typed={0x8, 0x2d, 0x0, 0x0, @pid=r2}, @nested={0x4, 0x37}]}, 0x223c}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = epoll_create(0x7ffd) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000080)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r6, &(0x7f00000000c0)) dup3(r5, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x0, 0x7ff}}, './file0\x00'}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r8, &(0x7f0000000040)={r3, r7}) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r9, &(0x7f00000000c0)) ioctl$BTRFS_IOC_QUOTA_RESCAN(r8, 0x4040942c, &(0x7f0000000100)={0x0, 0x200, [0x3ff, 0x4, 0x401, 0x401, 0x766, 0x3a9a000d]}) 05:34:36 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c505, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:36 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c53e, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:36 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = epoll_create(0x7ffd) r3 = epoll_create(0x7ffd) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000080)) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r6, &(0x7f00000000c0)) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x9) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r7, &(0x7f0000000080)) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r9, &(0x7f00000000c0)) dup3(r8, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x20000000}) 05:34:36 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = epoll_create(0x7ffd) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000080)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$EXT4_IOC_GET_ES_CACHE(r6, 0xc020662a, &(0x7f0000000100)={0x8001, 0x26d, 0x3, 0x0, 0x3, [{0x20, 0xc1, 0x1, '\x00', 0xb}, {0x40, 0x8, 0x5}, {0x0, 0x5, 0x200, '\x00', 0x1204}]}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r5, &(0x7f00000000c0)) dup3(r4, r2, 0x0) r7 = inotify_init() epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r7, &(0x7f0000000000)={0xc0002000}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:34:36 executing program 4: r0 = epoll_create(0x4) pwritev2(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="b9e619b72f8df3bd79ccfc950d4d399645c079fd86bb84f72a3ba639ba4defa9de2565d7c9f26969361613e75cbc3790ee4e9b5a19e9deec181e7911abd6eab5686df914756a3a66344428ee533f482cda981235944136e087248f2f3be802208ef8511ff003cfdd6089798861344e57ac3285ad8fc6f5962f767170940d92302ba1d4c3193694b92a59413b0dea0e7e0acaa5a3cb", 0x95}, {&(0x7f0000000040)="5252d55d14b05bf5434d80acb74f792cf594845c7587255afa32f18cd1572e2fc25cb19ebe2857a1c59dbd97079b00adf504615767ef588f43f25fc44e0f75707cbc9982251d8ee7ba7d1391598f", 0x4e}], 0x2, 0x5, 0x8000, 0xd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x2, 0xffff, 0x101, 0x0, 0x3}}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x100000001, 0x8}) 05:34:36 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c506, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:36 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c548, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:34:58 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c507, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:34:58 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x0, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:34:58 executing program 4: sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x234, 0x2, 0x2, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@CTA_EXPECT_MASK={0xa0, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @local}}}]}, @CTA_EXPECT_MASTER={0x50, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @local}}}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_EXPECT_MASK={0x88, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0xff}}, {0x14, 0x4, @empty}}}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xf86}, @CTA_EXPECT_NAT={0x58, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x1d}}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_EXPECT_NAT_TUPLE={0x14, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}]}, @CTA_EXPECT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x41}, 0x10) r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:34:58 executing program 7: r0 = epoll_create(0x60cd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/37}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:34:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:34:58 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c54a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:58 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000026c0)=ANY=[@ANYBLOB="14e5ff002200010d0000000000000000020000e2b17f62e3c112c80398a2e88669cc738d0211fb074a94baf0d4d39f765aee19da3eb9e03099f22f51ae8fc8b0d936b1f0ba924efd"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000100)=@un=@abs, 0x80, &(0x7f00000023c0)=[{&(0x7f0000000180)=""/136, 0x88}, {&(0x7f0000000280)=""/85, 0x55}, {&(0x7f0000000040)=""/34, 0x22}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/26, 0x1a}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/87, 0x57}], 0x7, &(0x7f0000002440)=""/169, 0xa9}, 0x7}, {{&(0x7f0000002500)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000002580)=""/22, 0x16}], 0x1}, 0x8}], 0x3, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYRES32], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80), 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)={0x20000008}) 05:34:58 executing program 4: epoll_create(0x7ffd) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = epoll_create(0x7ffd) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setstatus(r0, 0x4, 0x400) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000000c0)) dup3(r3, r1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r5, &(0x7f0000000000)={0x60000008}) ioctl$TCXONC(r0, 0x540a, 0x0) 05:34:58 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c54c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:58 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c508, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:34:58 executing program 7: r0 = epoll_create(0x7ffd) epoll_create(0x200) epoll_create(0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) open_by_handle_at(r1, &(0x7f0000000000)=@reiserfs_3={0xc, 0x3, {0x2000, 0x2, 0x9}}, 0x4440) epoll_create(0xffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) dup2(r2, r1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:34:58 executing program 7: r0 = epoll_create(0x1f) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000002300010d000000000000000002000000"], 0x14}}, 0x0) recvmmsg(r3, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000180)={0x40000002}) epoll_wait(r0, &(0x7f0000000140)=[{}, {}, {}, {}], 0x4, 0xfffffe01) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2006}], 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000100)={[0xe2b4]}, 0x8) pidfd_open(r4, 0x0) 05:34:58 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c568, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1958.410106] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=15140 comm=syz-executor.7 05:34:58 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x0, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) [ 1959.241268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=15238 comm=syz-executor.7 05:35:15 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c56c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:15 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="0200c3050000000018200000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000100)=ANY=[@ANYBLOB="010000ffee00000018000000c86d64f9caeb963069bd5dbd0064be8d8e50387ae7ae6c1c0e539da8264fff3ec6bdce1af651f738dea0b34baf00f83b3c23197304", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00000000000000005ceb"]) r4 = inotify_init() epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)={0xb0000008}) epoll_create(0x6868) 05:35:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:35:15 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x0, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:35:15 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c50a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:15 executing program 4: r0 = epoll_create(0x7ffd) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="010000000196f30000002e2f66696a65"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000002c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f00000001c0)=r5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000004c0)={"43b202257142c41243c106290602473a", r3, r4, {0x6d, 0x400}, {0xf552, 0x4}, 0x6, [0x6, 0xec, 0x1, 0x0, 0x2, 0x7, 0x40, 0x6, 0x5, 0x3, 0xff5, 0x3, 0x8, 0x36, 0x3, 0xfffffffffffffffb]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000005c0)={"7eb13db42824bec52da9d8ac2918be22", r5, r6, {0x7f}, {0xa936, 0x8000}, 0x3cb6, [0x8, 0x0, 0x7, 0x0, 0x8000, 0x7, 0x40, 0x9, 0x101, 0x3, 0x42b, 0x40, 0x100, 0x6, 0x100000000, 0x1]}) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/126}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r7, &(0x7f00000000c0)) 05:35:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xdc05, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:35:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:35:15 executing program 7: r0 = epoll_create(0x7ffd) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10000004}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)) 05:35:15 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c50c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:15 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x40000000}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7, 0x7f, 0x9, 0x6, 0x2, 0x3, 0xffff, 0x296, 0x40, 0x121, 0x0, 0x1000, 0x38, 0x2, 0x9, 0x9, 0x80}, [{0x4, 0x3, 0xf, 0x7f, 0x5, 0x1, 0x7fffffff, 0x5}, {0x6, 0x3, 0x2, 0xd4000000000000, 0x0, 0x81, 0x6}], "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", ['\x00']}, 0x2af) 05:35:15 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c56e, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:15 executing program 7: r0 = epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:35:15 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:35:15 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c510, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:15 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x24, r2}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x24, r4}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x24, r6}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wg1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'syztnl1\x00', 0x0, 0x29, 0x3f, 0x6c, 0x7f, 0x36, @loopback, @dev={0xfe, 0x80, '\x00', 0x1e}, 0x8000, 0x20, 0x2, 0x2}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x41, 0x8000, 0x94b, 0x7, {{0x2c, 0x4, 0x3, 0x5, 0xb0, 0x68, 0x0, 0x8, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0x6b, [@empty, @broadcast, @loopback, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x2c}, @empty, @loopback, @loopback, @loopback]}, @lsrr={0x83, 0x1f, 0x34, [@empty, @broadcast, @broadcast, @dev={0xac, 0x14, 0x14, 0x36}, @local, @broadcast, @local]}, @timestamp={0x44, 0x10, 0x7f, 0x0, 0x5, [0x10, 0x1, 0xcaaf]}, @generic={0x89, 0xd, "adcc1fd73d3b4499511d51"}, @noop, @end, @end, @timestamp={0x44, 0x10, 0x0, 0x0, 0x5, [0x81, 0x50000000, 0x12]}, @ssrr={0x89, 0x23, 0xb0, [@local, @loopback, @remote, @empty, @rand_addr=0x64010102, @broadcast, @broadcast, @remote]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x29, 0x5, 0x80, 0x2a3, 0x8, @dev={0xfe, 0x80, '\x00', 0x39}, @mcast1, 0x80, 0x7, 0x7, 0xfffffffb}}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000680)={@empty, @initdev, 0x0}, &(0x7f00000006c0)=0xc) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000780)={'ip6tnl0\x00', &(0x7f0000000700)={'syztnl2\x00', 0x0, 0x29, 0x6, 0xba, 0xcf6b, 0x2d, @local, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20, 0x1, 0x7, 0x2}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000a40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a00)={&(0x7f00000007c0)={0x240, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x4000000}, 0x40005) r13 = epoll_create(0x7ffd) r14 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r13, 0x1, r14, &(0x7f00000000c0)) 05:35:15 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r3, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x14000, 0x0) dup2(r3, r4) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000000000000000002eb1d478b00d49c6fcb"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000000)=0x5) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:35:16 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c574, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1975.633618] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15882 comm=syz-executor.7 [ 1976.416990] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15992 comm=syz-executor.7 05:35:31 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:35:31 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c511, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:31 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FAT_IOCTL_GET_VOLUME_ID(r1, 0x80047213, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:35:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xe803, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:35:31 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c57a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:35:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:35:31 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x4}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x40000000}) 05:35:31 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/185, 0xb9}, {&(0x7f0000000100)=""/149, 0x95}], 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:35:32 executing program 7: epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0x9, 0x200, 0x7fc}) 05:35:32 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c512, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:32 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c57e, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:32 executing program 7: r0 = epoll_create(0x7ffd) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x20}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)) 05:35:32 executing program 7: epoll_create(0x7ffd) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000000c0)) dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 05:35:32 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001010000"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:35:32 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c514, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:32 executing program 7: r0 = epoll_create(0x7ffd) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x40000000}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:35:47 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = epoll_create(0x7ffd) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000080)) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000000c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xce, &(0x7f0000001100)=0x6, 0x4) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r5, 0x29, 0x44, &(0x7f0000001180)={'TPROXY\x00'}, &(0x7f00000011c0)=0x1e) 05:35:47 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x4d2080) 05:35:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:35:47 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, 0x0, 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:35:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xf401, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:35:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:35:47 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c515, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:47 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c5f8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:47 executing program 7: r0 = epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x201a}) 05:35:47 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = mq_open(&(0x7f0000000000)='\x00', 0x2, 0x100, &(0x7f0000000040)={0x7, 0x101, 0x2, 0x5}) r3 = epoll_create(0x7ffd) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000080)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f00000000c0)) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000080)={0x8}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:35:47 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c5fc, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:48 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, 0x0, 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:35:48 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c519, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:48 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_pwait(r0, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}], 0x6, 0x6, &(0x7f0000000080)={[0xe31f]}, 0x8) r2 = epoll_create(0x7ffd) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000080)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r6, &(0x7f00000000c0)) dup3(r5, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0)=[{}, {}, {}], 0x3, 0x1000) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r7, &(0x7f00000000c0)) r8 = dup3(r4, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f0000000180)={0x2000}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000010000001805f6fe", @ANYRES32=r1, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file0\x00']) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r9, &(0x7f0000000140)={0x20000004}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:35:48 executing program 4: epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) 05:35:48 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:35:48 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x90) ioctl$KDSKBLED(r2, 0x4b65, 0x8b4) 05:35:48 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:35:48 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c538, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:36:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xff03, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:36:03 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='%!@%\x00', 0x0, r0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) open(&(0x7f0000000080)='./file0\x00', 0x32400, 0x33) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$TIOCNXCL(r2, 0x540d) 05:36:03 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = epoll_create(0x7ffd) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000080)) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000000c0)) ioctl$VT_WAITACTIVE(r4, 0x5607) 05:36:03 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:03 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, 0x0, 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:36:03 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c53a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:36:03 executing program 4: r0 = epoll_create(0x7fff) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x1800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'ip6gretap0\x00'}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000000)) 05:36:18 executing program 7: r0 = epoll_create(0x7ffd) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400), 0x400000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000440)={0x20000000}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x80000000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="0295fd137d2a0cc92e2f66696c653000"]) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000100)={0x4, &(0x7f0000000080)=[{0x9, 0x9}, {0x6}, {0x5, 0xddc4}, {0x1, 0xb03}]}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)) 05:36:18 executing program 4: r0 = epoll_create(0x7ffd) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000000c0)) dup3(r3, r1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r5, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r5, &(0x7f0000000000)) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r6, &(0x7f00000000c0)) 05:36:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:36:18 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:36:18 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x34000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:36:18 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c548, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:36:18 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0x10000008}) 05:36:18 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c54a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:18 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:18 executing program 4: r0 = epoll_create(0x7ffd) epoll_wait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x16df) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = fcntl$dupfd(r2, 0x0, r0) r4 = epoll_create(0x7ffd) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000080)) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e24, 0x7, @local, 0xfffffffc}, 0x1c) readv(r3, &(0x7f0000000400)=[{&(0x7f0000000140)=""/136, 0x88}, {&(0x7f0000000200)=""/232, 0xe8}, {&(0x7f0000000300)=""/207, 0xcf}], 0x3) r6 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r6, &(0x7f00000000c0)) 05:36:18 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c54c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:18 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x5}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:18 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:36:18 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c568, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:36 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:36:36 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x6}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:36 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c56c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:36 executing program 4: r0 = epoll_create(0x7ffd) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000000c0)) sendmsg$NFNL_MSG_CTHELPER_GET(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x1, 0x9, 0x5, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x7}}]}, 0x20}, 0x1, 0x0, 0x0, 0x44880}, 0x4) dup3(r3, r1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) readv(r0, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/59, 0x3b}], 0x1) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r5, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r5, &(0x7f0000000000)={0x10002010}) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r6, &(0x7f00000000c0)) 05:36:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x40000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:36:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:36:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:36:36 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) r3 = epoll_create(0x7ffd) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000080)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r6, &(0x7f00000000c0)) dup3(r5, r3, 0x0) kcmp$KCMP_EPOLL_TFD(r2, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000040)={r3, r1, 0x4}) 05:36:36 executing program 7: epoll_create(0x80) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000100)) 05:36:36 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = signalfd(r0, &(0x7f0000000000)={[0x7f]}, 0x8) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000080)={0x8000, 0x1, 0x4}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r3, 0x80089419, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000040)={0x2000}) 05:36:36 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:36 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c574, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:36 executing program 7: r0 = epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='io.pressure\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0x90000008}) 05:36:36 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:36:36 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) syz_open_dev$tty20(0xc, 0x4, 0x1) 05:36:36 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c57a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:36 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:36:36 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:36 executing program 7: epoll_create(0x7ffd) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = epoll_create(0x7) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000000c0)) dup3(r3, r1, 0x0) r5 = epoll_create(0x7ffd) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f0000000080)) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r8, &(0x7f00000000c0)) dup3(r7, r5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r0, &(0x7f0000000040)={0x18}) 05:36:51 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c586, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:51 executing program 7: r0 = epoll_create(0x7ffd) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) dup3(r0, r1, 0x80000) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)) 05:36:51 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:36:51 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0xa}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:36:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:36:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffea5}}], 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r2, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000000900)={{r2}, 0x0, 0x4, @inherit={0x60, &(0x7f0000000140)={0x1, 0x3, 0x5, 0x0, {0x21, 0x6, 0x4d393660, 0x4, 0x8001}, [0xffffffff, 0x0, 0xffffffffffff54ea]}}, @devid=r3}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000000)={r3, 0x5, 0x831}) epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) 05:36:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x200000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:36:51 executing program 4: r0 = epoll_create(0x8) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x2, 0x863, 0xffff, 0x400, 0x13, "b666895f1d4267b1f1bf6fa6b419e5508ef588"}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:36:51 executing program 4: r0 = epoll_create(0x7ffd) r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1004}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$unix(0x1, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f00000000c0)) 05:36:51 executing program 7: r0 = epoll_create(0x7ffd) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000040)=0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = epoll_create(0x7ffd) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000080)) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000000c0)) ioctl$KDADDIO(r4, 0x4b34, 0x8001) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) epoll_create(0x45) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, &(0x7f0000000000)) 05:36:52 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0xc}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:36:52 executing program 4: r0 = epoll_create(0x6) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:36:52 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c5a8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x400300, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:37:08 executing program 4: r0 = epoll_create(0xede0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:37:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:37:08 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x10}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:08 executing program 7: epoll_create(0x8) syz_open_dev$tty1(0xc, 0x4, 0x1) 05:37:08 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c5aa, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:37:08 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:37:08 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.latency\x00', 0x2, 0x0) r3 = epoll_create(0x7ffd) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000080)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f00000000c0)) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, &(0x7f0000000140)) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r6, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x5012}, {r1}, {r0, 0x1020}, {r6, 0x280}], 0x4, &(0x7f0000000080), &(0x7f0000000100)={[0x81]}, 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:37:08 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:08 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c5ac, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:08 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000840)={r3, 0xadac}) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000100)={r3, 0x5}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) 05:37:08 executing program 4: arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r0 = epoll_create(0x7ffd) r1 = inotify_init() epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x20000000}) syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f00000000c0)) r2 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x1) dup2(r2, r0) 05:37:08 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x12}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:08 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) clone3(&(0x7f0000000240)={0x46000480, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), {0x8000002e}, &(0x7f0000000200)=""/45, 0x2d, &(0x7f0000000140)=""/190, &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x3}, 0x58) pidfd_getfd(r2, r2, 0x0) tee(r1, r2, 0xcfb, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:37:08 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c5ae, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:24 executing program 4: r0 = epoll_create(0x10001) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x80000010}) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) 05:37:24 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:37:24 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x2}) 05:37:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:37:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:37:24 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x14}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:24 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c5b0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:37:24 executing program 7: r0 = epoll_create(0x7ffd) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FITHAW(r1, 0xc0045878) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001600)={0x1320, 0x22, 0xd01, 0x0, 0x0, {0x2}, [@generic="c15819bfe6ab1a771f92eb5d47fd0f53b97e678805cda41256174b1946bb0f1a8c74e7836307ff428e3d26eeb0fdd3cb5ef0cda44febcde096db5d02a6e40edb8ae9cd067b22c3f9ff31f68a9b9a131068a9e1cebb330a99ea467a12c5f3c068eec47c75d5d07715906547e37c8c6607d60e95c9744034bad3281aa6dec93bdd10f1bd5a8f39065828a969ab3a849a4d7d005e61a303e2031ef00c5f499ce7e87ddfaa4034a98536b83b4f5b4b64152843e7400b1c86813b6961660b710ee5ca8c72b668baa2ead173dd8cb823c21bd55b62bf8bbcab14e981479d2f52b87dbc0f656919a84be48fe1cd3d67ac2c3931fdcf9cc5197c06b5af700420f541a56636c3c6239b25c655640a0977705b9704d45826f32158eabe4a4030d0665d49fcb5a80cc966121d9d68fd5282d1bada4f359e118e45b7111327e3861faf8fa4e90fe809557dc85946e5f3f1c70052b575e2810d055c8f0a763b5ab0ce31f0ab7caca8479ad94c22a8403049bb50999cb42187bcdb289f0f54194bd82a633ff088e207c4bef0e2511e0395ba3bf2e36b09414cd951b11ac2c9417a451ac2211dd451d9fa9d74345318ac7e8b5d1689e89fd7424c9970463f67d31b52bf6a8e38bc92931192474470eeea39c5691d0463841b55607b01ec9a1d12537df4e126ffcba0c6d0df9f1bc9a735ef3150ca14484896acb426fbc05ba85047835188e50d1d3627bb827109f51c013c18981e0cbda3e0993a5dad6eacfa0884bdb29110045c98c1fb32854bd8f6c77f01443daf3d221c382aae326cd1cd1dd888d56862a5a0095445b991778a86d300b2b0ad9d26a7f1f4fd779ff6ce671f69fd58a84d9d76cdfc40f3b17607290927b7f8cb404365fa13304d687d5f78c08c4a8f7660b42828090a1fe228e29d923f398827360a4e79afac14a9bec3e7fa6098611f00bef6f30f5354737413c2fa3705e0b5d531857d33a7b5d07fce3d5e27905050d7f1d76353b8216ae75cd0cc1bffce4cd1960eca285c86d27cff441704dfa33358e27375d8aff0b40745c2c77bffb7787c747dcbff2873e2821fe898414f7aedb2fcc62840ede9cf81f714e4a0a3ceb59e0e51047733d708f2445e7d67478aa704d749169601f5ff974020d8943ce074ade560be574db7dd9a355a3e65af54fcbb6c4c878652d3fa16fbb29b5a3f3501a194a270a5195f36982c3af6d821a8f152045c6ab818989d654b327229e16db43f5171cef4f0614b9c35516a39f71d56143df90d06dc975f851bc776120f1b4951afe9c73a9750d7f43b0981195fe918cc1f1a37820529dd0205a8daec2898b3d476a1770115afe47eeb4f1dab0636d06151dd2ec5cd8002f3270e6ea7e2e0eaec8b125e202ee1c1793c751ba446620e3c5a78168fe64d69249b02d9d23fd2869e6224c04e29600a77d1863d0c96c1d99550c656c69c9ca8369acb67239e6504d551d30974da5d2f0fe8cb2f37600e5ced5aa0e416097b1c79e12f9842d0648e0b89f29f771103e19ab4527455881d07747886268f37edd2a7416a4a6fb57a68450402f83cac4e9356bf4cfa1eacc71a0fbecaca2b278a682cb42d760f7040b4aff6e4f6a516c5074a5f54b62fdb727eb89bea33c92675ad2493fcd06c7d35cd9337593138b50e03305338a0ffe7777eeef1b83d0cf329c7627a0f0a33c90c863e74110f34faa41fab6a2411d745d0e5514a449eb7f4c726eca7f476d5a3d17613c64bf15f1236fe616ce79bb83759419e15b41b693f1109a317cfb5552d6e99198bd327c2a3900b2c0b956271335fd34594563413a39dd51e39cbbe42ec4b960a1bcef9fd7c6d1b7673f9f3f773ef3df5acb526c19544458cdfb5e72e06acdff2fc25c9409cdcf71bbdf93478e503bd717ffecb4f67c60a265c7bcd730d019a7bf144864e031a6ff190daab99eaa32c640b2c43e5257bcf8b6aa4ed9dec61662860c341fd03307cad8b3194bd9918458cf90d7bf79a155d476a37e8f20f4f2064195a428080040fe27ed16280c07af13ae0bee0840bb025ffe2ee92df34e9191291615d566c2ac1f39c71e72bdbbb5f8a9bdfca28cd97096bdddc4df345f91037c318388e193f635c3d122d6df3fae6b40dd452cdf672bb1929e3faaad481aaf087ddeeb2b9160645ac99e8143e463ab834c3552ceb809310d4e6818a09e7334ae60c5749c3881bc06d5777c479bcade8e84994c77e7e604384e2a0d5d85edbc9070bd555a257be8202fa5a2d9114e9396b12b4af8e0600931e97cb744a6ca21f963f4df5b0723ddcad9a886434e696ea42470b22ebab500abdf7fd4affee797e3814a01d43558ab85699db4dac494fc0c944d94b7920a95edc237365212823ce7f98848dfa7cb0119ade8d711016c399eb3fea7a6d53ac514cc94018fa29bff53cd8fb8cd29f06e54bdc0c3fa74ff9d8dd5c8d85e1d45775211280576c906a556f9185e0eed4e168bf930b2865c4b2ac21f6e25f04c664f6590e7faba3c08d1d0d3e0d08dcf9a20e52c9e2e222526f9ca9c4eae2dc81798054b7ccb221c484afca44f750d00b2bfd35e6bec65bef397d8e85c34b10ea74c3b5e32d1b96efd07334d9a8a7fd7ce0cd2a209ad82e19fcf17d23741567acfad551b750889c2a2e740c92d457409a320b288009ffd31eb13776ca53f192859077a76bdc74afcbf1b1b93b4587900721c403b0ef71393ce326335fd5366289e16a6e3dc8e2f98b3b4be693857527713b6657109b5969df99a2cd4ae8ec5305a20d8d67519a72aa92b4dd718eed94dd453d2bf8622bbb268ecb2180be2008a22a708a387af8a10d78599b1f5991b55e81e2a7b5d01970b11c6362ea881ff64b1c4ba0a7861b788628cb076477636413a8e2c7bb8e402694fb6edcedc319b802f985fde5a917cb3b6501fe071b560d9d7515f23be2a86d804f208e946cc4e7d97608da83d903bf6b26fc96c713dc8b7346b2d6e25120157ca4dd4887a79e19b9960ab025cb6e59d90a84ce6cd62e2c6df1a76e3acc8eced6e2623762bfc0d8d3ab06f2aa0b12e606689843ce131679ad46fdcf1f3055315db4d9fb4d03c305f14aa6a6a486c7cf1405eb3109b5788d200be465c86b59f6e2c4a75e9a43147b27045afe2285e6c60bff2fe21a3f985f91e24fa715cb86800895d5fbe8947a98e5e802342942611934a4c6dfc29e0275925b810a66862641f0ce429e746ad2b15fbc5e061b1bf242937f9bfce777839ba65db62a2d1997323b1f140bf1dfe5b61065f5ab08d38969e6893747d77a95b8bfe7446209245067c413435d8c8cfd2a6413962872934f39d8d6beb113745b99c942369be6ab3fc8711748f3792617a3ef6a9fc1558ef5e1a39ab11c55908398bcc8e8d49307edc1c975b349b84fb2afa5ee465e3beced535386ada62fb28fcc03d0e0edb07166022084f61d071a2400ee71fce1fc3ac74502d1e8b3a3f40040e6be75c6417db4e0cc05830fa61e1c2488f55d9bb55107832557d13933f283aeae332dda07215805774275f9350bd11eef0889bb838a7b5171ba4f1140702481b9aaecb3249a7b9dfd5ad826b5f8008b57fdc9bfd3487fb27d3cb4d524ea9143edc6136fa27484d1db364ce6e4d4cb893eb3eb1e7cc88b42c5f0fd8599de73c3fb4e91ed0e338faff7b1abb805f88238e32f727ddc02c55edf1eae62b71d425bac47ba4cf98c0300563b39a83a336ba7b615e2de220124c5f13d1fad6adc8b2b4cd2325b5096b489dc11779fe06f49859141c5cd7daad32827cb74ba640e5d4f24bbe08141e4596ea273144113f49a69430cab63c6b430d2281c1abe31e3a59846a147de331c4f44e9df19705a420eb9d6f16e9a92b0d68eea50d4efe5d44a89152f649868441fde66878f34f9f3cb5659b425d7e61a085e6d1086440d4b857f64edd7a9ebd9bbd9054bb59c14047615cc5f519139eb6a90a2e88ce1db2d8620973b62922a2d3f6277259a4f183866b94847c436f4883a8fd00b1867267c335c6b8d5a01ea024994d89aebe619147659acfe83ba306f4dc454be906d56086d1593643ad8030344b62c22bd22cc8acfa1170b4dd567ebce977ff1382120becf11046d3f10f7b9345fe40548108c50929b91417e3a2ed9ff9a1314584f197627086dd6a3cef2ce11983b6a2800466238c162bbe45315901d3145602528b66f8d63ab79a8910f057ca2ea711093e549879502e6629c6d28fdf3de9bfc6f00dedaca81bfc501a17f72a0049d998c3f9784f0785b8e9f8456977364142ebee688c0ce273aa1d5484d1c28e3642e8d5e314c73f061ced3e3b21fbdaaeefe599114445cd44226930eeecc369626f73200f7510e16f5d717e332b164b9485ecd429ce614ec7522cb584c8db2d246054e72f89b2265f549de8b6654bb4e27ab2c563d95300498b1a755ab0d4a1e2ce445655794c5125c230e2183b5c2f2e1f8e10c5dcebd682b7aef49ebbcaaceccd81cf5ec480ec4f08bbbd882fbf94fe28ae2ee00148ee9232f8d6ebe88f74bbecc5e479cae0b38e05380d0b72cf1b6eacce01e89bde5091d07dde01990746d7e095f5c211644788e57ca9333cb6de0091e7b707075d3683441b23221b2da04563bdcde49636b0b468d42ac75a8996b7857fe9a9ce7a9ab58ddd084dec43ae7795542b381f203dad29d6889791f4545fe225f7104ca9314373f01f033f6099dc45f599ba0ce1b4d43ddb843e57cb7876a15dd064a81673e7a8d3f5c031018ec497c57c10df240c9114d08e660abfbc2588a139af777000f3c9f34b8473f5a0604c4bf31cc53628f552aea92bf3cb033aa0ebf73ec772b0074ee4e3b60e52ce78d30101a731616042c626f78847b8cb6e733fe992949b49b1ff176be2216d3933bc8a3f6655ac08c6cdd5ffcbb82ddb6dc2b2366b5b1417072b85783156d5913730d986bed2bd5f056f26ec8afb11066a69f2a1d2b331ab1b89f4e84c793af732819abcb030b0615e66f708c32bcc5ee5ca554520651d142af157f10be0de40394799e60d35d4a648facf361a210099b0ca10cb141e49e7c8264ad6d061c09b7559107a9f899cc7a77d4ad2aed26d5a59a335f37766a50da12457f38b585815521f654758a3af9c2cd1a1195f476752c1a0763e082db1a7a6be7965502898f5ff0e5e845e66b6861de1082e7d705ea49055e55d4752927a4b6e838d85ef6d2d62add0eb7c4fa8e20d78cd280ecc59f75465b72ad0187038c27f8babc06364dd2bb35a6f6344baeaae4fd7ddc12dd65fb3f681fe18b955e583e13330b0a05a1099a22917afa7ac39e9481dadb39d7603a0b5519f639aa93016b463c5984597fdd3ec394166539f70b3d7378d180c1e392fe0a08abdf91f5294473dd2f142a0884bbbbedf0011189b2962fe6373dafc3ced07597281eb867676b6c8d0cf1167e88a56bfd2ec7855d2cd44df7e03874fc13d6d002771ecc0201bb2a07cedcc82a2ce07712a99be276976855f1f4e04ef1f9ad2091f05d34e652a09d9eef5a2e5eee825cbbe4d385b6ec18d3710f7548cf8d825057ed0f7a80a0a0e000b5dee1a2aea85efaf6a390776b816e2c1e55167e3cec08e359382b3908ad17e8d59104b1e8f19d1d809f415015d930de1b6701f9a65dcecf9e6e345bea4919b5c41c6ce36abffe99eb35ee25b48328a6f347bb384c185a957df2267b388de2bc3ac166beed6b1c6f8d0d50afc063dabec0d5111066113c5cbe5f19d517fcb3319ae754551f5aa2006e059f1e6207a47099b1f2e0e4b0df21a3a24282fc6bedb3fba597c337db68e084", @nested={0x2f8, 0x8b, 0x0, 0x1, [@typed={0x14, 0x68, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @typed={0x8b, 0x36, 0x0, 0x0, @binary="d135c919fa6d2425ace866af01c55285724b81644ea79875ff93fe41ff63ca6a8f8e0dfcc971023950c541782c7fff241f8af94f87dbf4f8754e0aeedcb4863de207957160f36b89b000a6e1a4d66b9f33417d6e9432ee0623bfacdd4c0631cbf0557e9f5bbabbbcfc6f86e1a4f761ea8b4613b509d6953afbcb018dca06b5e9c815d30f145d92"}, @generic="1a91632927125a78804652c55f63a9ff61db0449dec9701410ddd7b91d96c5f722e4cb9bb73391090dc3ba14799044774d4f94887a838c0464f85c763bb07b9e52fb7b0641591c1d66e0167d45c9edd305d2ce8df55f1a2fe7f414039633b9963ce0bae7bce6ee6359ed748944f45181577be52f352c7b97794e265d4e5bcb6593267342bf26ca2b841fba55931fa35fc59322fb0a749f1db50f03e28c9ff0577dec6fd68dbcd581279ed68648a67aec2892d5f52102171b89dcb0227d1de7b607e067b4f4b03153d78bd4dfa1f4873095d018bfc431daa27b858ea4c2af070babf4b328ab3a512412", @generic="6e7ffb297384e43ae33322308a77361afb81df6f6db55d47c30b76a08bc8134ac9da551b68567e6c0c814b85b288f46aae34f4aeb049cda2665e69b16526b6079839fec6f1c8419a6a55a1c565f80dd4ca3eadb05ab70e932265b97a29187c851c2ef836d79e14d69cbf4b42999f6df83a808a5391f33debfc826d6adfa758eec25708cba6a3f1f7437a45083970ea28", @generic="a5d677d58730a4321bb6db56cacde70dbd4577d6526462c80dad818aa8098fc43a22fd6f8bdb8ec793c67369dd17c95df3d3a2133f5fb71db7b83c6af958081a63d44dc0569127863cfd724ddcd8b7a8896d8eb19c7e0eab9e78fd38bc4551f54c831b4364402980823af08422a303af6bd615844136a704c3274cf799d1e6ab7b2898a36e3333bafe2482ec8425e95e94f5aa9765dd346c6a0b157814f1ab7e2b86078abfe97b157d74b8acb4178b81fadf7c3a232105ba236d2123268e79ddf528db5488ae205f785b9ff3d9d65808b46644802466317a160d05"]}, @generic="c83bc83be8f638cb89ec64cd5be380ec2f96"]}, 0x1320}}, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) ioctl$PTP_PIN_GETFUNC2(r3, 0xc0603d0f, &(0x7f0000000340)={'\x00', 0x0, 0x0, 0x3}) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MAC_ACL(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)={0x170, r4, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1b8, 0x36}}}}, [@NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x64, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x7c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x34, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x4}]}, 0x170}, 0x1, 0x0, 0x0, 0x40}, 0x40) r5 = syz_open_dev$tty1(0xc, 0x4, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x210002, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r5, &(0x7f00000000c0)) 05:37:24 executing program 4: r0 = epoll_create(0x7ffd) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f00000000c0)) dup3(r2, r0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000002216010d000000000000000002000000"], 0x14}}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xb) recvmmsg(r4, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x2006}) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f00000000c0)) 05:37:24 executing program 7: r0 = epoll_create(0xb) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:37:25 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2104.551485] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5666 sclass=netlink_route_socket pid=20165 comm=syz-executor.4 05:37:25 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c5b2, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:25 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) [ 2104.587123] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5666 sclass=netlink_route_socket pid=20166 comm=syz-executor.4 05:37:25 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x10000001}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000280)={0x80000004}) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000002200010d00000000000089cf00000200c9a406361c6b2a9d4a97650ecf8bc1384a296c76b152d5fded42c806eec4b83a90a93ffbf309aee3fa8a9d3d57b96806e108d8417b35cd28261622d31fbf0dc186e47f10f6d2b727017627d66bc44e457015b65f6eb62707e03830c77edda9c40f5549fa087e3443377f6f22"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000340)={0x80000, 0x8, 0xc}, &(0x7f0000000380)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r4}}, 0x1) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f00000001c0)={0x5, 0x50, '\x00', 0x1, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/current\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r5, &(0x7f0000000100)={0x2011}) r6 = epoll_create(0x7ffd) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000080)) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r8, &(0x7f00000000c0)) ioctl$PIO_CMAP(r8, 0x4b71, &(0x7f0000000040)={0x9, 0x1, 0x3c, 0xb6b3, 0x8, 0x2a40000000}) 05:37:25 executing program 4: r0 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0xa0000000}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:37:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, 0x0, 0x0, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:37:41 executing program 7: r0 = epoll_create(0x7ffd) epoll_pwait(r0, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x1, &(0x7f0000000080)={[0x7]}, 0x8) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:37:41 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x2000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:37:41 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:37:41 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x1c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:41 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c5f0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:41 executing program 4: r0 = epoll_create(0x7ffd) close(0xffffffffffffffff) pipe(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x98a) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0x40087602, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$BTRFS_IOC_FS_INFO(r2, 0x8400941f, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f00000000c0)) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000100)) unshare(0x48020200) mount$9p_fd(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@afid={'afid', 0x3d, 0x4000000000000000}}]}}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r4, {0x6}}, './file0\x00'}) ioctl$KDGKBLED(r5, 0x4b64, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00000000c0)) 05:37:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x8000]}, 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 2120.603740] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. 05:37:41 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x4026c0, 0x0) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f0000000040)={0xffffffff, 0x8, 0x7f, 0x1, 0x7, "be77d1165a3935dcbba64191bf704804b93c32", 0x2, 0x1c}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xee00}}, './file0\x00'}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000140)={0x4}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:37:41 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c5f8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:41 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000040)) 05:37:41 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x24}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2120.840698] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. 05:37:41 executing program 7: r0 = epoll_create(0x7ffd) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000000c0)) dup3(r3, r1, 0x0) r5 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x92e, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000100)="2a6131d03af3da561784aee89b59fb8d5c2842b6cf36e1e23f1ad1c7508a5a5a949d14f0579256d02e09af10241073f6552209811590e1b954a9291ff12f0d076850506850328ca97ebc8dc41f06a6e17f2dca078eb707e34591a229dd4f2876287ac4035b4d1f623869493f4d74de16f5fba69ee51fe5d17a347c09853309767ed6f6fce3d3e73351d799887b772ba871c0c2a3", 0x94, 0x98e}, {&(0x7f00000001c0)="23de7f0d48687aebb1cf2c3d04fb312f3c6c6ffb54bb67da367cc189fa8f0d6599ee47d10f163ff7fb386c37fcd968caf41eed2c0d1b115a9f001313bfb301db28fd2e9210d81344bf8ce97028fd9afe9c2dbe9e4290a288b58ac2f7ff4b07f0adaa1098fefe43fb16059968aeecdf2e836f6747831b5dbd0229aeb04b99c09888a9e880f84bd5c2cb0da4f119486643eadf96767483c335792c62367378d834c44b7ffcac03c0e41c315832884ba89b04351664bde8334d1fb2d242", 0xbc}, {&(0x7f0000000280)="b64223822feadfe7088ffad120b37505d8c936d42dd7c2e1161f088acb168932b6fc4d818ff746e4b7d668fead8eb842aaca341ccadcb101db1699799a39d748c3ebbdf409f7995ffe715e72e0aab685decf7386039d42625c1cb81c9d63d36b91a13f2d3c2029249eb2e39b7925b90180e9fbd91c46cadde786c79cb26d44284274c00b2aaee13130f7357a7089214067bf85d3aa09d21f3dc22084c5d58f3c121624b6f39da1a26d6a5a941c", 0xad, 0x1}, {&(0x7f0000000340)="76c75ccb04e424bf83264becbca231e124a17d82d97fa0bef3ef17d97adf352ff3576f1859d41bf43d420390fd67a20e89101e7fedce845620b73412c13156624f159108ce07556688302e964734f7", 0x4f, 0xc1c}, {&(0x7f0000000080)="b35564ef6d115963122af9b8d0df852c7a481219c821c82afd05cc9127", 0x1d, 0x2}], 0x100010, &(0x7f0000000440)={[{'&@*'}, {']^$'}, {']*@$,@[%\x9b*'}, {':'}], [{@uid_eq}, {@uid_gt={'uid>', 0xee01}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, 'v'}}]}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r5, &(0x7f00000004c0)={0x10000000}) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r6, &(0x7f00000000c0)) 05:37:41 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x20000016}) 05:37:41 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:37:41 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c5fc, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:56 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f603b953c98fbcb2428292a2b2c2d2e2f303132333435423700003a3b3c3d3e3f40000000000002000000000000000000003b0ed79988b82e7489af4406cb8f0178e68a0132387e5da4a6a389b3f2b18c93c74e77f23a363ad447bcca7cb83f7d9a713eeb92343b67f9fff5ca0bdd03fe1710405ed4b967e5458311990070f2b505491b9029e70db8c43dcd70198276501739351163237e6fb1c8bf2b5af4fdb95b83c706e41b59deb83387d7eb1edaa496454b0742c70a6cda512888b9bd9506f2102d811a9e98f501ec038fd2829a2eacdde43c4fd57f5e3abcc5f0b82522ade210c640f951c5e2c9005e7bd1ecb4bd9237dc7a06e4b6a65c7688c7d5f063b2b86b9039c4b495055ef5958c08a3aeaf42e01e05e16bf181c668ad743c0784f71e0dc3d6179a2c3ae213f50ba647ffa51f44de5722117a5b96de5cbc7348521bcecaf67addb3c816c8006ac5398cce223e8baed4"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:56 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:37:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f00000001c0)) r1 = epoll_create(0x7ffd) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) openat(r3, &(0x7f0000000140)='./file0\x00', 0x81, 0x101) pwritev2(r1, &(0x7f0000000100)=[{&(0x7f0000000000)="583c65b339fd80932c60d97580fe74080b9902e1ebdf3a0755cff93cfef8b6b13045084c25ec6b97557c13d5daf14a0841064b506c46a3756007d5c08c645907ec5b0181d9a3f09d2dc83ee0ec5bd4539599e32fe2391cc6c5cf6a59c88f6a15e1223436f5c0c63026611adaff21e7a84c239a2056d28df70923073251a8bcbf971a1ce599b3befe87e145bfb6", 0x8d}], 0x1, 0x1, 0x0, 0x12) 05:37:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x3000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:37:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, 0x0, 0x0, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:37:56 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:56 executing program 7: mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000100)=0x7, 0xfffffffffffffffb, 0x5) r0 = epoll_create(0x6) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000001800)={0x2, {0x2, 0x7, 0x400, 0x8, 0x81}}) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) r3 = epoll_create1(0x80000) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r0, &(0x7f0000000080)={r0, r3}) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r6, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) dup(r6) ioctl$SG_IO(r5, 0x2285, &(0x7f0000001780)={0x53, 0xfffffffffffffffc, 0x95, 0x5, @scatter={0x9, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/34, 0x22}, {&(0x7f0000000180)=""/8, 0x8}, {&(0x7f00000001c0)=""/156, 0x9c}, {&(0x7f0000000280)=""/113, 0x71}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f00000003c0)=""/95, 0x5f}, {&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/4096, 0x1000}]}, &(0x7f0000001580)="15183bebf05b5213891ec35cee18aa2f9acb6419ae59b9e037f9a43677220d96b2d637c3c789def61757fdd9a315c894071abeb6d0df9784c6ac2fbe43c6d9a6eb4afbd52cc33bd8bb51510fc807a228c4bc31961187e25c0d0fcdd156653f87d3fea76e180f16034c7253ea5ef12f5fc297a83b0139554924b24ca5ee69da4bbe49ad6bbebee0e291f3d3416b608e3f1f94730c98", &(0x7f0000001640)=""/223, 0x1, 0x2, 0x1, &(0x7f0000001740)}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:37:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, 0x0, 0x0, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:37:57 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000600)=@updsa={0x144, 0x10, 0x1, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x0, 0x32}, @in6=@private0, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}, @lastused={0xc}]}, 0x144}}, 0x0) r1 = epoll_create(0x791) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_wait(r1, &(0x7f0000000000)=[{}, {}], 0x2, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) 05:37:57 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = epoll_create(0x7ffd) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000080)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r5, &(0x7f00000000c0)) dup3(r4, r2, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r6, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000000)={r2, r6, 0x8}) 05:37:57 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x38}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:57 executing program 4: epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400bbea358ae5b806c345829f1cad3c9d66311af83ded030000001800020caec05d"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = epoll_create(0x7ffd) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x10000004}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000000c0)) dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x20000000}) epoll_create(0xfffffffe) recvmmsg(0xffffffffffffffff, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="00346aee0100010000000000e4315ec64dfea0f3a4879d7d38b8"]) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x24, r6}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000280)={'wg2\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x124, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x10}, 0x22040005) 05:37:57 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:57 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x3a}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:57 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:37:57 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:57 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x3e}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:57 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:57 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x48}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:37:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, 0x0, 0x0, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:37:57 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x5}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:37:57 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x4a}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100), 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:38:14 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:38:14 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, 0x0}, 0x0) syz_io_uring_setup(0x523e, &(0x7f0000000000)={0x0, 0x31b9, 0x2, 0x0, 0x35f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)=0x0) r6 = syz_io_uring_setup(0x3153, &(0x7f0000000140), &(0x7f0000fef000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r6, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r9, r8, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r10}}, 0x8001) syz_io_uring_submit(r2, r5, &(0x7f0000000180)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x1, &(0x7f0000000140)=[r0, r0], 0x2, 0x0, 0x0, {0x0, r10}}, 0x7fffffff) 05:38:14 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x6}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, 0x0, 0x0, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:38:14 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x4c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:14 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) sendfile(r1, r1, 0x0, 0x1) 05:38:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x8000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:38:15 executing program 4: r0 = epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000000000000000000000000000002000000"], 0x14}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xac, 0x0, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x64}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x59}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x88}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x62a74a741997c013}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3f}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x801}, 0x40000) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x10000008}) 05:38:15 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2154.649404] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22348 comm=syz-executor.4 05:38:15 executing program 7: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003fc0)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)=""/185, 0xb9}, {&(0x7f00000005c0)=""/28, 0x1c}], 0x2}}], 0x1, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{}], 0x2000000000000096, 0x0, 0x0, 0x0) r0 = epoll_create(0x7ffd) fallocate(r0, 0x4e, 0x0, 0xce0c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000040)={0x3, 0x1, 0xc, 0x20, 0xc5, &(0x7f0000000100)}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) epoll_create(0x8) creat(&(0x7f0000000000)='./file0\x00', 0x19) 05:38:15 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x68}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:15 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:38:15 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:15 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x6c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:15 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0xa}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2155.470366] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22351 comm=syz-executor.4 05:38:32 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x6e}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x9000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:38:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, 0x0, 0x0, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:38:32 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:38:32 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0xc}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={'\x00', '\xff\xff', @local}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@private1, 0x0, 0x6c}, 0x0, @in=@multicast2, 0x0, 0x2, 0x0, 0xa}}, 0xe8) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x86, &(0x7f0000000100)={@local, @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "60e9eca51b913db8f2e8c451c6492a93273f3e5a81aebb3fe1580051a1657cdc", "ef341e008fa00504f312e7b8462700f3", {"36cd250a0cb728d6eec84085575dab02", "c8aca1d59b8892d6f675cca0eefe4b0b"}}}}}}}, 0x0) r1 = epoll_create(0x7ffd) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x8, 0xe8, 0x66, 0xffffffff, 0x2, 0x3e, 0x2, 0x2c7, 0x40, 0x31f, 0x8000, 0x7fff, 0x38, 0x2, 0x9, 0x5, 0xffff}, [{0x60000000, 0x7b1c, 0x3ff, 0x1, 0x4, 0x2, 0xc1, 0x80000000}], "19b0b849b5d41d99", ['\x00', '\x00', '\x00', '\x00']}, 0x480) r4 = epoll_create(0x7ffd) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000080)) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f00000000c0)) ioctl$KDSIGACCEPT(r6, 0x4b4e, 0x26) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580), 0xc0, 0x0) readv(r7, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/42, 0x2a}, {&(0x7f0000000600)=""/39, 0x27}, {&(0x7f0000000640)=""/244, 0xf4}, {&(0x7f0000000740)=""/60, 0x3c}], 0x4) 05:38:32 executing program 7: r0 = epoll_create(0x7ffd) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x10000005}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = epoll_create(0x7ffd) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000080)) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000140)={0x5}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x5cb0}}, './file0\x00'}) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x4002, 0x1ad, 0x80, 0x9, 0x2}}) 05:38:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100), 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:38:32 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4014040}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r1, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x2c, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1a}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x27}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000001) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2043, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000880)=0xfff, 0x1000000000007fc) r3 = epoll_create(0x7ffd) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) r5 = syz_open_dev$sg(&(0x7f0000000040), 0x1, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r6, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$FICLONE(r5, 0x40049409, r6) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x1, 0x81, 0x40, 0x2bd, 0x2, 0x3, 0x1000, 0x1ee, 0x40, 0xc6, 0x5, 0x184, 0x38, 0x1, 0x7fff, 0x7, 0x1}, [{0x5, 0x6, 0x3, 0x4, 0x4, 0x4, 0x82a, 0x6}, {0x6474e551, 0xfffffff7, 0x7, 0x8000000000, 0x9, 0x8001, 0x2, 0x6}], "e2443096f97d94dd70b0b33dd794b08cb59faeba9c2553dbf70eaf97c4ac9a6954b8f1fb97474bc565e856a0b313b31fe5c8936f4bc5929be80ab473887933d466dd53c67927f2f66a831e907c77ebad75833f194f0a0b301f0ec7c90e2c38fab48b375a09b29048c3706adddafb3165a192c86a8d1e7e30ccb365b1bd6cbbc3db944fc4520ffd6500fbd200f028f00d31e03dea2055f16799ef9c27a2b144ff3b12bea45a051738645f93ccd3ba889c64e3", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x662) 05:38:33 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x1022, 0xd01, 0x70bd29, 0x25dfdbff, {0x2}}, 0x14}}, 0x41) recvmmsg(r2, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000000)) 05:38:33 executing program 4: r0 = epoll_create(0x7ffd) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x200040, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/47, 0x2f}, {&(0x7f0000000440)=""/45, 0x2d}], 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x40, 0xf8, 0xff, 0x5, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffff7f, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x4000, 0x80000000, 0x9, 0x5, 0x80, 0x4, 0x7, 0x0, 0x2, 0x0, 0xc21}, 0xffffffffffffffff, 0x2, r1, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)) syz_io_uring_setup(0x5ea8, &(0x7f0000000100)={0x0, 0xfcb, 0x2, 0x2, 0x11e}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r2, 0x0, 0x0, 0x0, {0x1018}, 0x1, {0x0, r4}}, 0x3) 05:38:33 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x10}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:33 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x74}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:33 executing program 4: r0 = epoll_create(0x7ffd) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0xd0000006}) 05:38:33 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x7a}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:33 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:33 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:38:33 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x7e}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:33 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x10}) syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, 0x0}, 0x0) syz_io_uring_setup(0x506c, &(0x7f0000000000)={0x0, 0x6b45, 0x1, 0x2, 0x36c}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0xc000)=nil, &(0x7f0000000080), &(0x7f0000000100)=0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r6, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r2, r5, &(0x7f0000000140)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x4, 0x0, @fd=r6, 0x8, 0x0, 0x0, 0x9}, 0x7) 05:38:33 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x12}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100), 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:38:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x11000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:38:33 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:38:49 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x48, r0) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "8306b2e827094e5dcf0fd522c8349ceac026f1d855456d1addd351aeec08464cc1aee812273b4331eced1837ffa8b1de9111c3963913fcbe3d793e307897d5a3", 0x2d}, 0x48, r1) keyctl$link(0x8, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0xf0}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:49 executing program 4: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = epoll_create(0x7ffd) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040)={0x10000002}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) r5 = epoll_create(0x7ffd) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x22, 0xd01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r7, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r7, &(0x7f0000000100)={0x2004}) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r8, &(0x7f00000000c0)) ioctl$TCSETSW(r8, 0x5403, &(0x7f0000000080)={0x23, 0xfffff169, 0x101, 0x3, 0x5, "ea0b06000000cdb6e410ed7167c1acb2ba2e61"}) dup3(r4, r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000140)={0x2008}) 05:38:49 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 05:38:49 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x14}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:49 executing program 7: r0 = epoll_create(0x7ffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000000)={0x3, 0x9, 0xa916, 0x5, 0x80, "2efdd1afa4cc3f7af649cb0fb33228c61b550d", 0x2800, 0xfb}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 05:38:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x400200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100), 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:38:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(r0, &(0x7f0000000100), 0x8, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 05:38:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) umount2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x30000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 05:38:49 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:38:49 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) write$bt_hci(r2, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b7980e3a6d74af07c389b9fd983de2e9f900c3630abf8af9a8b3462a4925020c570e11ead90072e7db51219b9a378f251353aecfecd600a5554167df52d7b369edb"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) openat(r4, &(0x7f0000001240)='/proc/self/exe\x00', 0x204201, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="01380400c95540ff7f021500000400009bf4c220c1ef5d050006000000ee470057ab0100000066ed4616362c41e00001"], 0x4c) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x8000000) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) VM DIAGNOSIS: 05:43:56 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000000 RCX=ffffffff811a92f9 RDX=ffff88804e57cec0 RSI=ffffffff811a9307 RDI=0000000000000005 RBP=dffffc0000000000 RSP=ffff88806ce09cb0 R8 =0000000000000000 R9 =ffffffff868616e7 R10=0000000000000040 R11=0000000000000001 R12=ffff88806ce38380 R13=ffff88800887a000 R14=ffff88806ce383c8 R15=ffffffff811add30 RIP=ffffffff81408ca6 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f49377fb700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc953ac3998 CR3=000000003ece8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000418fdc7c80000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffff8880088b0000 RBX=ffff88801add60c8 RCX=ffffffff81257f5a RDX=1ffff110035bac19 RSI=0000000000000008 RDI=ffff88801add60c8 RBP=ffff888051873480 RSP=ffff88805348f8e0 R8 =0000000000000000 R9 =ffff88801add60cf R10=ffffed10035bac19 R11=0000000000000001 R12=ffff888051873480 R13=ffff88801add60c8 R14=ffff8880088b0000 R15=dffffc0000000000 RIP=ffffffff81257f78 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f0e261fb700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa2a28e3010 CR3=00000000501a0000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffff000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=40404040404040404040404040404040 XMM05=5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a XMM06=20202020202020202020202020202020 XMM07=00000000000000000000000000000000 XMM08=25203a646672656d6974206574616572 XMM09=00000000000000000000000000000000 XMM10=20000000200000002000000020000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000