executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) [ 2265.657742] FAULT_INJECTION: forcing a failure. 08:29:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2265.657742] name failslab, interval 1, probability 0, space 0, times 0 [ 2265.660025] CPU: 1 PID: 43155 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2265.661038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2265.662209] Call Trace: [ 2265.662589] dump_stack+0x107/0x167 [ 2265.663109] should_fail.cold+0x5/0xa [ 2265.663675] ? copy_process+0x1add/0x7800 [ 2265.664267] should_failslab+0x5/0x20 [ 2265.664836] kmem_cache_alloc+0x5b/0x310 [ 2265.665421] ? _raw_spin_unlock+0x1a/0x30 [ 2265.666018] copy_process+0x1add/0x7800 [ 2265.666587] ? mark_lock+0xf5/0x2df0 [ 2265.667125] ? lock_acquire+0x197/0x470 [ 2265.667706] ? find_held_lock+0x2c/0x110 [ 2265.668300] ? __cleanup_sighand+0xb0/0xb0 [ 2265.668944] ? _copy_from_user+0xfb/0x1b0 [ 2265.669553] kernel_clone+0xe7/0x980 [ 2265.670086] ? lock_acquire+0x197/0x470 [ 2265.670661] ? create_io_thread+0xf0/0xf0 [ 2265.671268] ? ksys_write+0x21a/0x260 [ 2265.671815] ? lock_downgrade+0x6d0/0x6d0 [ 2265.672407] __do_sys_clone3+0x1e5/0x320 [ 2265.673010] ? __do_sys_clone+0x110/0x110 [ 2265.673627] ? rcu_read_lock_any_held+0x75/0xa0 [ 2265.674298] ? vfs_write+0x354/0xa70 [ 2265.674835] ? fput_many+0x2f/0x1a0 [ 2265.675366] ? ksys_write+0x1a9/0x260 [ 2265.675910] ? __ia32_sys_read+0xb0/0xb0 [ 2265.676494] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2265.677281] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2265.678012] ? trace_hardirqs_on+0x5b/0x180 [ 2265.678632] do_syscall_64+0x33/0x40 [ 2265.679171] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2265.679899] RIP: 0033:0x7f7f3dd15b19 [ 2265.680334] FAULT_INJECTION: forcing a failure. [ 2265.680334] name failslab, interval 1, probability 0, space 0, times 0 [ 2265.680428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2265.680438] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2265.685074] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2265.686090] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2265.687104] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2265.688116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2265.689148] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2265.690185] CPU: 0 PID: 43158 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2265.690770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2265.691444] Call Trace: [ 2265.691665] dump_stack+0x107/0x167 [ 2265.691969] should_fail.cold+0x5/0xa [ 2265.692274] ? create_new_namespaces+0x30/0xb20 [ 2265.692649] should_failslab+0x5/0x20 [ 2265.692969] kmem_cache_alloc+0x5b/0x310 [ 2265.693298] ? cap_capable+0x1cd/0x230 [ 2265.693609] create_new_namespaces+0x30/0xb20 [ 2265.693982] copy_namespaces+0x3fb/0x4f0 [ 2265.694313] copy_process+0x385b/0x7800 [ 2265.694638] ? mark_lock+0xf5/0x2df0 [ 2265.694946] ? lock_acquire+0x197/0x470 [ 2265.695279] ? __cleanup_sighand+0xb0/0xb0 [ 2265.695630] ? _copy_from_user+0xfb/0x1b0 [ 2265.695967] kernel_clone+0xe7/0x980 [ 2265.696271] ? lock_acquire+0x197/0x470 [ 2265.696597] ? create_io_thread+0xf0/0xf0 [ 2265.696948] ? ksys_write+0x21a/0x260 [ 2265.697256] ? lock_downgrade+0x6d0/0x6d0 [ 2265.697591] __do_sys_clone3+0x1e5/0x320 [ 2265.697916] ? __do_sys_clone+0x110/0x110 [ 2265.698262] ? rcu_read_lock_any_held+0x75/0xa0 08:29:36 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) [ 2265.698637] ? vfs_write+0x354/0xa70 [ 2265.699088] ? fput_many+0x2f/0x1a0 [ 2265.699384] ? ksys_write+0x1a9/0x260 [ 2265.699688] ? __ia32_sys_read+0xb0/0xb0 [ 2265.700018] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2265.700437] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2265.700853] ? trace_hardirqs_on+0x5b/0x180 [ 2265.701203] do_syscall_64+0x33/0x40 [ 2265.701501] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2265.701906] RIP: 0033:0x7f3d2b989b19 [ 2265.702204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2265.703631] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2265.704223] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2265.704800] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2265.705368] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2265.705935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2265.706500] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:29:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:29:36 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) [ 2265.830709] FAULT_INJECTION: forcing a failure. [ 2265.830709] name failslab, interval 1, probability 0, space 0, times 0 [ 2265.832150] CPU: 1 PID: 43168 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2265.832965] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2265.833906] Call Trace: [ 2265.834219] dump_stack+0x107/0x167 [ 2265.834643] should_fail.cold+0x5/0xa [ 2265.835087] ? create_object.isra.0+0x3a/0xa20 [ 2265.835634] should_failslab+0x5/0x20 [ 2265.836199] kmem_cache_alloc+0x5b/0x310 [ 2265.836828] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 2265.837434] create_object.isra.0+0x3a/0xa20 [ 2265.837939] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2265.838526] kmem_cache_alloc+0x159/0x310 [ 2265.839028] create_new_namespaces+0x30/0xb20 [ 2265.839553] copy_namespaces+0x3fb/0x4f0 [ 2265.840030] copy_process+0x385b/0x7800 [ 2265.840587] ? mark_lock+0xf5/0x2df0 [ 2265.841050] ? lock_acquire+0x197/0x470 [ 2265.841528] ? __cleanup_sighand+0xb0/0xb0 [ 2265.842031] ? _copy_from_user+0xfb/0x1b0 [ 2265.842515] kernel_clone+0xe7/0x980 [ 2265.842942] ? lock_acquire+0x197/0x470 [ 2265.843401] ? create_io_thread+0xf0/0xf0 [ 2265.843887] ? ksys_write+0x21a/0x260 [ 2265.844326] ? lock_downgrade+0x6d0/0x6d0 [ 2265.844831] __do_sys_clone3+0x1e5/0x320 [ 2265.845318] ? __do_sys_clone+0x110/0x110 [ 2265.845819] ? rcu_read_lock_any_held+0x75/0xa0 [ 2265.846350] ? vfs_write+0x354/0xa70 [ 2265.846800] ? fput_many+0x2f/0x1a0 [ 2265.847223] ? ksys_write+0x1a9/0x260 [ 2265.847661] ? __ia32_sys_read+0xb0/0xb0 [ 2265.848128] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2265.848728] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2265.849337] ? trace_hardirqs_on+0x5b/0x180 [ 2265.849842] do_syscall_64+0x33/0x40 [ 2265.850287] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2265.850874] RIP: 0033:0x7f3d2b989b19 [ 2265.851313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2265.853432] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2265.854324] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2265.855141] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2265.855948] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2265.856789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2265.857614] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:29:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:29:52 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000180)={0x173, 0x20, &(0x7f0000000500)}) 08:29:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:29:52 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) 08:29:52 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 08:29:52 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b", 0xa, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:29:52 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:29:52 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b", 0xa, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2281.859276] FAULT_INJECTION: forcing a failure. [ 2281.859276] name failslab, interval 1, probability 0, space 0, times 0 [ 2281.861096] CPU: 1 PID: 43182 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2281.862155] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2281.863410] Call Trace: [ 2281.863819] dump_stack+0x107/0x167 [ 2281.864380] should_fail.cold+0x5/0xa [ 2281.864980] ? inc_ucount+0x472/0x7f0 [ 2281.865571] should_failslab+0x5/0x20 [ 2281.866162] kmem_cache_alloc_trace+0x55/0x320 [ 2281.866868] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2281.867671] inc_ucount+0x472/0x7f0 [ 2281.868228] ? retire_userns_sysctls+0x80/0x80 [ 2281.868926] ? kmem_cache_alloc+0x159/0x310 [ 2281.869591] ? lock_downgrade+0x6d0/0x6d0 [ 2281.870236] alloc_mnt_ns+0x88/0x420 [ 2281.870802] copy_mnt_ns+0xae/0xa00 [ 2281.871366] ? kmem_cache_alloc+0x2a6/0x310 [ 2281.872021] create_new_namespaces+0xd6/0xb20 [ 2281.872724] copy_namespaces+0x3fb/0x4f0 [ 2281.873359] copy_process+0x385b/0x7800 [ 2281.873974] ? mark_lock+0xf5/0x2df0 [ 2281.874553] ? lock_acquire+0x197/0x470 [ 2281.875184] ? __cleanup_sighand+0xb0/0xb0 [ 2281.875850] ? _copy_from_user+0xfb/0x1b0 [ 2281.876494] kernel_clone+0xe7/0x980 [ 2281.877078] ? lock_acquire+0x197/0x470 [ 2281.877692] ? create_io_thread+0xf0/0xf0 [ 2281.878346] ? ksys_write+0x21a/0x260 [ 2281.878933] ? lock_downgrade+0x6d0/0x6d0 [ 2281.879576] __do_sys_clone3+0x1e5/0x320 [ 2281.880203] ? __do_sys_clone+0x110/0x110 [ 2281.880859] ? rcu_read_lock_any_held+0x75/0xa0 [ 2281.881579] ? vfs_write+0x354/0xa70 [ 2281.882149] ? fput_many+0x2f/0x1a0 [ 2281.882707] ? ksys_write+0x1a9/0x260 [ 2281.883283] ? __ia32_sys_read+0xb0/0xb0 [ 2281.883915] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2281.884715] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2281.885505] ? trace_hardirqs_on+0x5b/0x180 [ 2281.886172] do_syscall_64+0x33/0x40 [ 2281.886745] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2281.887516] RIP: 0033:0x7f3d2b989b19 [ 2281.888086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2281.890885] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2281.892055] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2281.893149] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2281.894243] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2281.895324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2281.896414] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2281.923325] FAULT_INJECTION: forcing a failure. [ 2281.923325] name failslab, interval 1, probability 0, space 0, times 0 [ 2281.925426] CPU: 1 PID: 43193 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2281.926496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2281.927759] Call Trace: [ 2281.928173] dump_stack+0x107/0x167 [ 2281.928734] should_fail.cold+0x5/0xa [ 2281.929330] ? create_object.isra.0+0x3a/0xa20 [ 2281.930036] should_failslab+0x5/0x20 [ 2281.930621] kmem_cache_alloc+0x5b/0x310 [ 2281.931251] create_object.isra.0+0x3a/0xa20 [ 2281.931934] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2281.932718] kmem_cache_alloc+0x159/0x310 [ 2281.933363] ? _raw_spin_unlock+0x1a/0x30 [ 2281.934008] copy_process+0x1add/0x7800 [ 2281.934635] ? mark_lock+0xf5/0x2df0 [ 2281.935213] ? lock_acquire+0x197/0x470 [ 2281.935816] ? find_held_lock+0x2c/0x110 [ 2281.936455] ? __cleanup_sighand+0xb0/0xb0 [ 2281.937120] ? _copy_from_user+0xfb/0x1b0 [ 2281.937767] kernel_clone+0xe7/0x980 [ 2281.938345] ? lock_acquire+0x197/0x470 [ 2281.938966] ? create_io_thread+0xf0/0xf0 [ 2281.939615] ? ksys_write+0x21a/0x260 [ 2281.940208] ? lock_downgrade+0x6d0/0x6d0 [ 2281.940849] __do_sys_clone3+0x1e5/0x320 [ 2281.941471] ? __do_sys_clone+0x110/0x110 [ 2281.942128] ? rcu_read_lock_any_held+0x75/0xa0 [ 2281.942841] ? vfs_write+0x354/0xa70 [ 2281.943409] ? fput_many+0x2f/0x1a0 [ 2281.943967] ? ksys_write+0x1a9/0x260 [ 2281.944546] ? __ia32_sys_read+0xb0/0xb0 [ 2281.945184] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2281.945987] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2281.946835] ? trace_hardirqs_on+0x5b/0x180 [ 2281.947628] do_syscall_64+0x33/0x40 [ 2281.948205] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2281.948997] RIP: 0033:0x7f7f3dd15b19 [ 2281.949572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2281.952345] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2281.953513] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2281.954594] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2281.955676] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2281.956754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2281.957846] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:29:53 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 08:29:53 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) [ 2282.176804] FAULT_INJECTION: forcing a failure. [ 2282.176804] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.178679] CPU: 1 PID: 43209 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2282.179756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.181049] Call Trace: [ 2282.181483] dump_stack+0x107/0x167 [ 2282.182061] should_fail.cold+0x5/0xa [ 2282.182665] ? create_object.isra.0+0x3a/0xa20 [ 2282.183389] should_failslab+0x5/0x20 [ 2282.183989] kmem_cache_alloc+0x5b/0x310 [ 2282.184639] create_object.isra.0+0x3a/0xa20 [ 2282.185351] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2282.186151] kmem_cache_alloc_trace+0x151/0x320 [ 2282.186883] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.187709] inc_ucount+0x472/0x7f0 [ 2282.188291] ? retire_userns_sysctls+0x80/0x80 [ 2282.189020] ? kmem_cache_alloc+0x159/0x310 [ 2282.189700] ? lock_downgrade+0x6d0/0x6d0 [ 2282.190364] alloc_mnt_ns+0x88/0x420 [ 2282.190956] copy_mnt_ns+0xae/0xa00 [ 2282.191536] ? kmem_cache_alloc+0x2a6/0x310 [ 2282.192224] create_new_namespaces+0xd6/0xb20 [ 2282.192938] copy_namespaces+0x3fb/0x4f0 [ 2282.193600] copy_process+0x385b/0x7800 [ 2282.194228] ? mark_lock+0xf5/0x2df0 [ 2282.194832] ? lock_acquire+0x197/0x470 [ 2282.195482] ? __cleanup_sighand+0xb0/0xb0 [ 2282.196171] ? _copy_from_user+0xfb/0x1b0 [ 2282.196330] FAULT_INJECTION: forcing a failure. [ 2282.196330] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.196830] kernel_clone+0xe7/0x980 [ 2282.196851] ? lock_acquire+0x197/0x470 [ 2282.196869] ? create_io_thread+0xf0/0xf0 [ 2282.196900] ? ksys_write+0x21a/0x260 [ 2282.196919] ? lock_downgrade+0x6d0/0x6d0 [ 2282.196941] __do_sys_clone3+0x1e5/0x320 [ 2282.196970] ? __do_sys_clone+0x110/0x110 [ 2282.197009] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.197025] ? vfs_write+0x354/0xa70 [ 2282.197043] ? fput_many+0x2f/0x1a0 [ 2282.197069] ? ksys_write+0x1a9/0x260 [ 2282.205543] ? __ia32_sys_read+0xb0/0xb0 [ 2282.206177] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.207015] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.207810] ? trace_hardirqs_on+0x5b/0x180 [ 2282.208512] do_syscall_64+0x33/0x40 [ 2282.209106] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2282.209927] RIP: 0033:0x7f3d2b989b19 [ 2282.210505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.213440] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2282.214656] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2282.215795] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2282.216936] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.218082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2282.219222] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2282.220397] CPU: 0 PID: 43211 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2282.221532] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.222860] Call Trace: [ 2282.223294] dump_stack+0x107/0x167 [ 2282.223886] should_fail.cold+0x5/0xa [ 2282.224504] ? copy_process+0x1c5b/0x7800 [ 2282.225189] should_failslab+0x5/0x20 [ 2282.225804] kmem_cache_alloc+0x5b/0x310 [ 2282.226461] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.227307] copy_process+0x1c5b/0x7800 [ 2282.227931] ? mark_lock+0xf5/0x2df0 [ 2282.228540] ? lock_acquire+0x197/0x470 [ 2282.229169] ? find_held_lock+0x2c/0x110 [ 2282.229839] ? __cleanup_sighand+0xb0/0xb0 [ 2282.230517] ? _copy_from_user+0xfb/0x1b0 [ 2282.231198] kernel_clone+0xe7/0x980 [ 2282.231780] ? lock_acquire+0x197/0x470 [ 2282.232420] ? create_io_thread+0xf0/0xf0 [ 2282.233094] ? ksys_write+0x21a/0x260 [ 2282.233709] ? lock_downgrade+0x6d0/0x6d0 [ 2282.234365] __do_sys_clone3+0x1e5/0x320 [ 2282.235015] ? __do_sys_clone+0x110/0x110 [ 2282.235683] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.236428] ? vfs_write+0x354/0xa70 [ 2282.237036] ? fput_many+0x2f/0x1a0 [ 2282.237624] ? ksys_write+0x1a9/0x260 [ 2282.238238] ? __ia32_sys_read+0xb0/0xb0 [ 2282.238880] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.239723] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.240533] ? trace_hardirqs_on+0x5b/0x180 [ 2282.241237] do_syscall_64+0x33/0x40 [ 2282.241820] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2282.242644] RIP: 0033:0x7f7f3dd15b19 [ 2282.243229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.246176] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2282.247396] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2282.248536] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2282.249684] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.250824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2282.251962] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:29:53 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) [ 2282.616368] FAULT_INJECTION: forcing a failure. [ 2282.616368] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.618626] CPU: 1 PID: 43215 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2282.619742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.621082] Call Trace: [ 2282.621526] dump_stack+0x107/0x167 [ 2282.622139] should_fail.cold+0x5/0xa [ 2282.622770] ? create_object.isra.0+0x3a/0xa20 [ 2282.623520] should_failslab+0x5/0x20 [ 2282.624146] kmem_cache_alloc+0x5b/0x310 [ 2282.624816] create_object.isra.0+0x3a/0xa20 [ 2282.625542] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2282.626376] kmem_cache_alloc+0x159/0x310 [ 2282.627065] copy_process+0x1c5b/0x7800 [ 2282.627720] ? mark_lock+0xf5/0x2df0 [ 2282.628352] ? lock_acquire+0x197/0x470 [ 2282.629013] ? find_held_lock+0x2c/0x110 [ 2282.629697] ? __cleanup_sighand+0xb0/0xb0 [ 2282.630406] ? _copy_from_user+0xfb/0x1b0 [ 2282.631096] kernel_clone+0xe7/0x980 [ 2282.631707] ? lock_acquire+0x197/0x470 [ 2282.632370] ? create_io_thread+0xf0/0xf0 [ 2282.633074] ? ksys_write+0x21a/0x260 [ 2282.633701] ? lock_downgrade+0x6d0/0x6d0 [ 2282.634387] __do_sys_clone3+0x1e5/0x320 [ 2282.635053] ? __do_sys_clone+0x110/0x110 [ 2282.635753] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.636509] ? vfs_write+0x354/0xa70 [ 2282.637129] ? fput_many+0x2f/0x1a0 [ 2282.637738] ? ksys_write+0x1a9/0x260 [ 2282.638374] ? __ia32_sys_read+0xb0/0xb0 [ 2282.639044] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.639899] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.640735] ? trace_hardirqs_on+0x5b/0x180 [ 2282.641456] do_syscall_64+0x33/0x40 [ 2282.642066] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2282.642897] RIP: 0033:0x7f7f3dd15b19 [ 2282.643509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.646472] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2282.647705] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2282.648859] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2282.650048] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.651204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2282.652349] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:29:53 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) 08:29:53 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) [ 2282.780280] FAULT_INJECTION: forcing a failure. [ 2282.780280] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.782128] CPU: 1 PID: 43218 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2282.783203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.784479] Call Trace: [ 2282.784899] dump_stack+0x107/0x167 [ 2282.785477] should_fail.cold+0x5/0xa [ 2282.786075] ? alloc_mnt_ns+0xce/0x420 [ 2282.786685] should_failslab+0x5/0x20 [ 2282.787282] kmem_cache_alloc_trace+0x55/0x320 [ 2282.787999] alloc_mnt_ns+0xce/0x420 [ 2282.788580] copy_mnt_ns+0xae/0xa00 [ 2282.789159] ? kmem_cache_alloc+0x2a6/0x310 [ 2282.789832] create_new_namespaces+0xd6/0xb20 [ 2282.790544] copy_namespaces+0x3fb/0x4f0 [ 2282.791185] copy_process+0x385b/0x7800 [ 2282.791809] ? mark_lock+0xf5/0x2df0 [ 2282.792398] ? lock_acquire+0x197/0x470 [ 2282.793042] ? __cleanup_sighand+0xb0/0xb0 [ 2282.793747] ? _copy_from_user+0xfb/0x1b0 [ 2282.794398] kernel_clone+0xe7/0x980 [ 2282.794977] ? lock_acquire+0x197/0x470 [ 2282.795591] ? create_io_thread+0xf0/0xf0 [ 2282.796246] ? ksys_write+0x21a/0x260 [ 2282.796829] ? lock_downgrade+0x6d0/0x6d0 [ 2282.797503] __do_sys_clone3+0x1e5/0x320 [ 2282.798139] ? __do_sys_clone+0x110/0x110 [ 2282.798796] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.799520] ? vfs_write+0x354/0xa70 [ 2282.800093] ? fput_many+0x2f/0x1a0 [ 2282.800674] ? ksys_write+0x1a9/0x260 [ 2282.801272] ? __ia32_sys_read+0xb0/0xb0 [ 2282.801926] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.802731] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.803546] ? trace_hardirqs_on+0x5b/0x180 [ 2282.804214] do_syscall_64+0x33/0x40 [ 2282.804806] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2282.805597] RIP: 0033:0x7f3d2b989b19 [ 2282.806194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.809003] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2282.810165] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2282.811253] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2282.812338] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.813435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2282.814528] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2282.858775] FAULT_INJECTION: forcing a failure. [ 2282.858775] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.861045] CPU: 0 PID: 43220 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2282.862157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.863476] Call Trace: [ 2282.863908] dump_stack+0x107/0x167 [ 2282.864498] should_fail.cold+0x5/0xa [ 2282.865124] ? create_new_namespaces+0x30/0xb20 [ 2282.865878] should_failslab+0x5/0x20 [ 2282.866490] kmem_cache_alloc+0x5b/0x310 [ 2282.867145] ? cap_capable+0x1cd/0x230 [ 2282.867774] create_new_namespaces+0x30/0xb20 [ 2282.868500] copy_namespaces+0x3fb/0x4f0 [ 2282.869166] copy_process+0x385b/0x7800 [ 2282.869784] ? mark_lock+0xf5/0x2df0 [ 2282.870392] ? lock_acquire+0x197/0x470 [ 2282.871053] ? __cleanup_sighand+0xb0/0xb0 [ 2282.871765] ? _copy_from_user+0xfb/0x1b0 [ 2282.872436] kernel_clone+0xe7/0x980 [ 2282.873047] ? lock_acquire+0x197/0x470 [ 2282.873685] ? create_io_thread+0xf0/0xf0 [ 2282.874374] ? ksys_write+0x21a/0x260 [ 2282.874987] ? lock_downgrade+0x6d0/0x6d0 [ 2282.875658] __do_sys_clone3+0x1e5/0x320 [ 2282.876310] ? __do_sys_clone+0x110/0x110 [ 2282.877005] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.877757] ? vfs_write+0x354/0xa70 [ 2282.878357] ? fput_many+0x2f/0x1a0 [ 2282.878958] ? ksys_write+0x1a9/0x260 [ 2282.879571] ? __ia32_sys_read+0xb0/0xb0 [ 2282.880226] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.881048] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.881871] ? trace_hardirqs_on+0x5b/0x180 [ 2282.882548] do_syscall_64+0x33/0x40 [ 2282.883149] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2282.883939] RIP: 0033:0x7f7f3dd15b19 [ 2282.884538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.887365] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2282.888586] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2282.889739] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2282.890878] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.892018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2282.893165] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:30:09 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) 08:30:09 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r2 = getpgrp(0x0) tgkill(r2, r2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r2, 0x9, r3, 0x3) fsync(r0) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r1, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:30:09 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a9", 0xf, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:09 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a9", 0xf, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:30:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:30:09 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) 08:30:09 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2298.595807] FAULT_INJECTION: forcing a failure. [ 2298.595807] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.597685] CPU: 1 PID: 43227 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2298.598750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2298.600026] Call Trace: [ 2298.600442] dump_stack+0x107/0x167 [ 2298.601008] should_fail.cold+0x5/0xa [ 2298.601612] ? create_object.isra.0+0x3a/0xa20 [ 2298.602329] should_failslab+0x5/0x20 [ 2298.602919] kmem_cache_alloc+0x5b/0x310 [ 2298.603550] create_object.isra.0+0x3a/0xa20 [ 2298.604225] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2298.605015] kmem_cache_alloc_trace+0x151/0x320 [ 2298.605748] alloc_mnt_ns+0xce/0x420 [ 2298.606325] copy_mnt_ns+0xae/0xa00 [ 2298.606890] ? kmem_cache_alloc+0x2a6/0x310 [ 2298.607562] create_new_namespaces+0xd6/0xb20 [ 2298.608261] copy_namespaces+0x3fb/0x4f0 [ 2298.608892] copy_process+0x385b/0x7800 [ 2298.609515] ? mark_lock+0xf5/0x2df0 [ 2298.610098] ? lock_acquire+0x197/0x470 [ 2298.610730] ? __cleanup_sighand+0xb0/0xb0 [ 2298.611399] ? _copy_from_user+0xfb/0x1b0 [ 2298.612048] kernel_clone+0xe7/0x980 [ 2298.612628] ? lock_acquire+0x197/0x470 [ 2298.613252] ? create_io_thread+0xf0/0xf0 [ 2298.613904] ? ksys_write+0x21a/0x260 [ 2298.614493] ? lock_downgrade+0x6d0/0x6d0 [ 2298.615138] __do_sys_clone3+0x1e5/0x320 [ 2298.615766] ? __do_sys_clone+0x110/0x110 [ 2298.616423] ? rcu_read_lock_any_held+0x75/0xa0 [ 2298.617150] ? vfs_write+0x354/0xa70 [ 2298.617728] ? fput_many+0x2f/0x1a0 [ 2298.618292] ? ksys_write+0x1a9/0x260 [ 2298.618882] ? __ia32_sys_read+0xb0/0xb0 [ 2298.619518] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2298.620330] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2298.621126] ? trace_hardirqs_on+0x5b/0x180 [ 2298.621811] do_syscall_64+0x33/0x40 [ 2298.622387] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2298.623177] RIP: 0033:0x7f3d2b989b19 [ 2298.623753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.626572] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2298.627747] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2298.628845] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2298.629951] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2298.631048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2298.632143] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2298.646535] FAULT_INJECTION: forcing a failure. [ 2298.646535] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.647701] CPU: 0 PID: 43236 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2298.648271] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2298.648934] Call Trace: [ 2298.649173] dump_stack+0x107/0x167 [ 2298.649466] should_fail.cold+0x5/0xa [ 2298.649773] ? create_object.isra.0+0x3a/0xa20 [ 2298.650177] should_failslab+0x5/0x20 [ 2298.650487] kmem_cache_alloc+0x5b/0x310 [ 2298.650823] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 2298.651230] create_object.isra.0+0x3a/0xa20 [ 2298.651583] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2298.651992] kmem_cache_alloc+0x159/0x310 [ 2298.652341] create_new_namespaces+0x30/0xb20 [ 2298.652701] copy_namespaces+0x3fb/0x4f0 [ 2298.653028] copy_process+0x385b/0x7800 [ 2298.653366] ? lock_acquire+0x197/0x470 [ 2298.653693] ? __cleanup_sighand+0xb0/0xb0 [ 2298.654038] ? _copy_from_user+0xfb/0x1b0 [ 2298.654383] kernel_clone+0xe7/0x980 [ 2298.654682] ? create_io_thread+0xf0/0xf0 [ 2298.655016] ? perf_event_sched_in.isra.0+0x80/0x80 [ 2298.655418] __do_sys_clone3+0x1e5/0x320 [ 2298.655739] ? __do_sys_clone+0x110/0x110 [ 2298.656069] ? finish_task_switch+0x126/0x5d0 [ 2298.656439] ? finish_task_switch+0xef/0x5d0 [ 2298.656806] ? io_schedule_timeout+0x140/0x140 [ 2298.657201] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 2298.657570] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 2298.658004] ? ksys_write+0x1a9/0x260 [ 2298.658396] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2298.658919] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2298.659435] ? trace_hardirqs_on+0x5b/0x180 [ 2298.659858] do_syscall_64+0x33/0x40 [ 2298.660238] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2298.660733] RIP: 0033:0x7f7f3dd15b19 [ 2298.661098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.662811] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2298.663423] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2298.663992] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2298.664568] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2298.665164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2298.665747] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:30:09 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) [ 2298.881602] FAULT_INJECTION: forcing a failure. [ 2298.881602] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.882983] CPU: 0 PID: 43259 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2298.883538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2298.884204] Call Trace: [ 2298.884428] dump_stack+0x107/0x167 [ 2298.884723] should_fail.cold+0x5/0xa [ 2298.885034] ? alloc_vfsmnt+0x23/0x680 [ 2298.885369] should_failslab+0x5/0x20 [ 2298.885678] kmem_cache_alloc+0x5b/0x310 [ 2298.886011] ? lock_release+0x680/0x680 [ 2298.886352] alloc_vfsmnt+0x23/0x680 [ 2298.886653] clone_mnt+0x6c/0xce0 [ 2298.886940] copy_tree+0xfe/0xa60 [ 2298.887228] ? down_write_killable+0x180/0x180 [ 2298.887606] copy_mnt_ns+0x144/0xa00 [ 2298.887905] ? kmem_cache_alloc+0x2a6/0x310 [ 2298.888268] create_new_namespaces+0xd6/0xb20 [ 2298.888637] copy_namespaces+0x3fb/0x4f0 [ 2298.888968] copy_process+0x385b/0x7800 [ 2298.889309] ? mark_lock+0xf5/0x2df0 [ 2298.889609] ? lock_acquire+0x197/0x470 [ 2298.889947] ? __cleanup_sighand+0xb0/0xb0 [ 2298.890308] ? _copy_from_user+0xfb/0x1b0 [ 2298.890644] kernel_clone+0xe7/0x980 [ 2298.890948] ? lock_acquire+0x197/0x470 [ 2298.891284] ? create_io_thread+0xf0/0xf0 [ 2298.891631] ? ksys_write+0x21a/0x260 [ 2298.891939] ? lock_downgrade+0x6d0/0x6d0 [ 2298.892283] __do_sys_clone3+0x1e5/0x320 [ 2298.892620] ? __do_sys_clone+0x110/0x110 [ 2298.892974] ? rcu_read_lock_any_held+0x75/0xa0 [ 2298.893360] ? vfs_write+0x354/0xa70 [ 2298.893661] ? fput_many+0x2f/0x1a0 [ 2298.893953] ? ksys_write+0x1a9/0x260 [ 2298.894263] ? __ia32_sys_read+0xb0/0xb0 [ 2298.894595] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2298.895022] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2298.895441] ? trace_hardirqs_on+0x5b/0x180 [ 2298.895797] do_syscall_64+0x33/0x40 [ 2298.896099] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2298.896522] RIP: 0033:0x7f3d2b989b19 [ 2298.896827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.898293] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2298.898901] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2298.899487] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2298.900061] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2298.900651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2298.901240] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:30:10 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 33) 08:30:10 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) 08:30:10 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2299.094588] FAULT_INJECTION: forcing a failure. [ 2299.094588] name failslab, interval 1, probability 0, space 0, times 0 [ 2299.095673] CPU: 0 PID: 43262 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2299.096225] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2299.096883] Call Trace: [ 2299.097110] dump_stack+0x107/0x167 [ 2299.097414] should_fail.cold+0x5/0xa [ 2299.097724] ? inc_ucount+0x472/0x7f0 [ 2299.098034] should_failslab+0x5/0x20 [ 2299.098342] kmem_cache_alloc_trace+0x55/0x320 [ 2299.098719] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2299.099138] inc_ucount+0x472/0x7f0 [ 2299.099433] ? retire_userns_sysctls+0x80/0x80 [ 2299.099795] ? kmem_cache_alloc+0x159/0x310 [ 2299.100142] ? lock_downgrade+0x6d0/0x6d0 [ 2299.100485] alloc_mnt_ns+0x88/0x420 [ 2299.100787] copy_mnt_ns+0xae/0xa00 [ 2299.101080] ? kmem_cache_alloc+0x2a6/0x310 [ 2299.101440] create_new_namespaces+0xd6/0xb20 [ 2299.101807] copy_namespaces+0x3fb/0x4f0 [ 2299.102139] copy_process+0x385b/0x7800 [ 2299.102462] ? mark_lock+0xf5/0x2df0 [ 2299.102766] ? lock_acquire+0x197/0x470 [ 2299.103099] ? __cleanup_sighand+0xb0/0xb0 [ 2299.103451] ? _copy_from_user+0xfb/0x1b0 [ 2299.103787] kernel_clone+0xe7/0x980 [ 2299.104089] ? lock_acquire+0x197/0x470 [ 2299.104409] ? create_io_thread+0xf0/0xf0 [ 2299.104752] ? ksys_write+0x21a/0x260 [ 2299.105058] ? lock_downgrade+0x6d0/0x6d0 [ 2299.105403] __do_sys_clone3+0x1e5/0x320 [ 2299.105726] ? __do_sys_clone+0x110/0x110 [ 2299.106074] ? rcu_read_lock_any_held+0x75/0xa0 [ 2299.106445] ? vfs_write+0x354/0xa70 [ 2299.106744] ? fput_many+0x2f/0x1a0 [ 2299.107038] ? ksys_write+0x1a9/0x260 [ 2299.107347] ? __ia32_sys_read+0xb0/0xb0 [ 2299.107675] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2299.108099] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2299.108510] ? trace_hardirqs_on+0x5b/0x180 [ 2299.108861] do_syscall_64+0x33/0x40 [ 2299.109170] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2299.109581] RIP: 0033:0x7f7f3dd15b19 [ 2299.109882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2299.111352] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2299.111962] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2299.112531] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2299.113100] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2299.113673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2299.114245] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2299.115616] FAULT_INJECTION: forcing a failure. [ 2299.115616] name failslab, interval 1, probability 0, space 0, times 0 [ 2299.116596] CPU: 0 PID: 43264 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2299.117156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2299.117821] Call Trace: [ 2299.118034] dump_stack+0x107/0x167 [ 2299.118328] should_fail.cold+0x5/0xa [ 2299.118636] ? create_object.isra.0+0x3a/0xa20 [ 2299.119008] should_failslab+0x5/0x20 [ 2299.119313] kmem_cache_alloc+0x5b/0x310 [ 2299.119639] ? kfree+0x1ab/0x340 [ 2299.119915] create_object.isra.0+0x3a/0xa20 [ 2299.120271] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2299.120682] kmem_cache_alloc+0x159/0x310 [ 2299.121018] ? lock_release+0x680/0x680 [ 2299.121351] alloc_vfsmnt+0x23/0x680 [ 2299.121649] clone_mnt+0x6c/0xce0 [ 2299.121934] copy_tree+0xfe/0xa60 [ 2299.122218] ? down_write_killable+0x180/0x180 [ 2299.122591] copy_mnt_ns+0x144/0xa00 [ 2299.122895] ? kmem_cache_alloc+0x2a6/0x310 [ 2299.123243] create_new_namespaces+0xd6/0xb20 [ 2299.123606] copy_namespaces+0x3fb/0x4f0 [ 2299.123939] copy_process+0x385b/0x7800 [ 2299.124258] ? mark_lock+0xf5/0x2df0 [ 2299.124566] ? lock_acquire+0x197/0x470 [ 2299.124898] ? __cleanup_sighand+0xb0/0xb0 [ 2299.125257] ? _copy_from_user+0xfb/0x1b0 [ 2299.125597] kernel_clone+0xe7/0x980 [ 2299.125897] ? lock_acquire+0x197/0x470 [ 2299.126215] ? create_io_thread+0xf0/0xf0 [ 2299.126557] ? ksys_write+0x21a/0x260 [ 2299.126873] ? lock_downgrade+0x6d0/0x6d0 [ 2299.127208] __do_sys_clone3+0x1e5/0x320 [ 2299.127532] ? __do_sys_clone+0x110/0x110 [ 2299.127883] ? rcu_read_lock_any_held+0x75/0xa0 [ 2299.128257] ? vfs_write+0x354/0xa70 [ 2299.128555] ? fput_many+0x2f/0x1a0 [ 2299.128847] ? ksys_write+0x1a9/0x260 [ 2299.129165] ? __ia32_sys_read+0xb0/0xb0 [ 2299.129494] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2299.129913] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2299.130324] ? trace_hardirqs_on+0x5b/0x180 [ 2299.130673] do_syscall_64+0x33/0x40 [ 2299.130971] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2299.131382] RIP: 0033:0x7f3d2b989b19 [ 2299.131678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2299.133132] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2299.133747] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2299.134320] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2299.134891] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2299.135460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2299.136031] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:30:10 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 34) [ 2299.320248] FAULT_INJECTION: forcing a failure. [ 2299.320248] name failslab, interval 1, probability 0, space 0, times 0 [ 2299.321437] CPU: 0 PID: 43273 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2299.321984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2299.322640] Call Trace: [ 2299.322859] dump_stack+0x107/0x167 [ 2299.323151] should_fail.cold+0x5/0xa [ 2299.323461] ? create_object.isra.0+0x3a/0xa20 [ 2299.323834] should_failslab+0x5/0x20 [ 2299.324148] kmem_cache_alloc+0x5b/0x310 [ 2299.324478] create_object.isra.0+0x3a/0xa20 [ 2299.324825] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2299.325233] kmem_cache_alloc_trace+0x151/0x320 [ 2299.325606] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2299.326027] inc_ucount+0x472/0x7f0 [ 2299.326326] ? retire_userns_sysctls+0x80/0x80 [ 2299.326688] ? kmem_cache_alloc+0x159/0x310 [ 2299.327033] ? lock_downgrade+0x6d0/0x6d0 [ 2299.327370] alloc_mnt_ns+0x88/0x420 [ 2299.327667] copy_mnt_ns+0xae/0xa00 [ 2299.327961] ? kmem_cache_alloc+0x2a6/0x310 [ 2299.328307] create_new_namespaces+0xd6/0xb20 [ 2299.328672] copy_namespaces+0x3fb/0x4f0 [ 2299.328996] copy_process+0x385b/0x7800 [ 2299.329328] ? mark_lock+0xf5/0x2df0 [ 2299.329628] ? lock_acquire+0x197/0x470 [ 2299.329959] ? __cleanup_sighand+0xb0/0xb0 [ 2299.330309] ? _copy_from_user+0xfb/0x1b0 [ 2299.330647] kernel_clone+0xe7/0x980 [ 2299.330946] ? lock_acquire+0x197/0x470 [ 2299.331262] ? create_io_thread+0xf0/0xf0 [ 2299.331602] ? ksys_write+0x21a/0x260 [ 2299.331906] ? lock_downgrade+0x6d0/0x6d0 [ 2299.332242] __do_sys_clone3+0x1e5/0x320 [ 2299.332566] ? __do_sys_clone+0x110/0x110 [ 2299.332912] ? rcu_read_lock_any_held+0x75/0xa0 [ 2299.333288] ? vfs_write+0x354/0xa70 [ 2299.333587] ? fput_many+0x2f/0x1a0 [ 2299.333878] ? ksys_write+0x1a9/0x260 [ 2299.334183] ? __ia32_sys_read+0xb0/0xb0 [ 2299.334511] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2299.334929] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2299.335335] ? trace_hardirqs_on+0x5b/0x180 [ 2299.335685] do_syscall_64+0x33/0x40 [ 2299.335983] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2299.336389] RIP: 0033:0x7f7f3dd15b19 [ 2299.336683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2299.338138] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2299.338745] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2299.339310] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2299.339872] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2299.340440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2299.341009] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:30:10 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 33) 08:30:10 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a9", 0xf, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2299.487215] FAULT_INJECTION: forcing a failure. [ 2299.487215] name failslab, interval 1, probability 0, space 0, times 0 [ 2299.488161] CPU: 0 PID: 43281 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2299.488716] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2299.489384] Call Trace: [ 2299.489608] dump_stack+0x107/0x167 [ 2299.489909] should_fail.cold+0x5/0xa [ 2299.490229] ? create_object.isra.0+0x3a/0xa20 [ 2299.490601] should_failslab+0x5/0x20 [ 2299.490916] kmem_cache_alloc+0x5b/0x310 [ 2299.491240] ? kfree+0x1ab/0x340 [ 2299.491519] create_object.isra.0+0x3a/0xa20 [ 2299.491872] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2299.492278] kmem_cache_alloc+0x159/0x310 [ 2299.492616] ? lock_release+0x680/0x680 [ 2299.492941] alloc_vfsmnt+0x23/0x680 [ 2299.493246] clone_mnt+0x6c/0xce0 [ 2299.493532] copy_tree+0xfe/0xa60 [ 2299.493816] ? down_write_killable+0x180/0x180 [ 2299.494196] copy_mnt_ns+0x144/0xa00 [ 2299.494496] ? kmem_cache_alloc+0x2a6/0x310 [ 2299.494856] create_new_namespaces+0xd6/0xb20 [ 2299.495228] copy_namespaces+0x3fb/0x4f0 [ 2299.495560] copy_process+0x385b/0x7800 [ 2299.495881] ? mark_lock+0xf5/0x2df0 [ 2299.496189] ? lock_acquire+0x197/0x470 [ 2299.496520] ? __cleanup_sighand+0xb0/0xb0 [ 2299.496873] ? _copy_from_user+0xfb/0x1b0 [ 2299.497218] kernel_clone+0xe7/0x980 [ 2299.497524] ? lock_acquire+0x197/0x470 [ 2299.497842] ? create_io_thread+0xf0/0xf0 [ 2299.498191] ? ksys_write+0x21a/0x260 [ 2299.498495] ? lock_downgrade+0x6d0/0x6d0 [ 2299.498837] __do_sys_clone3+0x1e5/0x320 [ 2299.499160] ? __do_sys_clone+0x110/0x110 [ 2299.499521] ? rcu_read_lock_any_held+0x75/0xa0 [ 2299.499899] ? vfs_write+0x354/0xa70 [ 2299.500205] ? fput_many+0x2f/0x1a0 [ 2299.500498] ? ksys_write+0x1a9/0x260 [ 2299.500813] ? __ia32_sys_read+0xb0/0xb0 [ 2299.501138] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2299.501565] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2299.501972] ? trace_hardirqs_on+0x5b/0x180 [ 2299.502332] do_syscall_64+0x33/0x40 [ 2299.502632] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2299.503050] RIP: 0033:0x7f3d2b989b19 [ 2299.503349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2299.504825] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2299.505445] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2299.506011] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2299.506576] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2299.507139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2299.507704] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:30:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2315.151439] FAULT_INJECTION: forcing a failure. [ 2315.151439] name failslab, interval 1, probability 0, space 0, times 0 [ 2315.152390] CPU: 0 PID: 43295 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2315.152931] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2315.153591] Call Trace: [ 2315.153814] dump_stack+0x107/0x167 [ 2315.154107] should_fail.cold+0x5/0xa [ 2315.154413] ? create_object.isra.0+0x3a/0xa20 [ 2315.154776] should_failslab+0x5/0x20 [ 2315.155087] kmem_cache_alloc+0x5b/0x310 [ 2315.155407] ? mark_held_locks+0x9e/0xe0 [ 2315.155733] create_object.isra.0+0x3a/0xa20 [ 2315.156089] kmemleak_alloc_percpu+0xa0/0x100 [ 2315.156451] pcpu_alloc+0x4e2/0x1240 [ 2315.156764] alloc_vfsmnt+0xfd/0x680 [ 2315.157061] clone_mnt+0x6c/0xce0 [ 2315.157353] copy_tree+0xfe/0xa60 [ 2315.157627] ? down_write_killable+0x180/0x180 [ 2315.158001] copy_mnt_ns+0x144/0xa00 [ 2315.158295] ? kmem_cache_alloc+0x2a6/0x310 [ 2315.158643] create_new_namespaces+0xd6/0xb20 [ 2315.159005] copy_namespaces+0x3fb/0x4f0 [ 2315.159334] copy_process+0x385b/0x7800 [ 2315.159648] ? mark_lock+0xf5/0x2df0 [ 2315.159947] ? lock_acquire+0x197/0x470 [ 2315.160277] ? __cleanup_sighand+0xb0/0xb0 [ 2315.160625] ? _copy_from_user+0xfb/0x1b0 [ 2315.160960] kernel_clone+0xe7/0x980 [ 2315.161254] ? lock_acquire+0x197/0x470 [ 2315.161586] ? create_io_thread+0xf0/0xf0 [ 2315.161921] ? ksys_write+0x21a/0x260 [ 2315.162221] ? lock_downgrade+0x6d0/0x6d0 [ 2315.162548] __do_sys_clone3+0x1e5/0x320 [ 2315.162867] ? __do_sys_clone+0x110/0x110 [ 2315.163210] ? rcu_read_lock_any_held+0x75/0xa0 [ 2315.163579] ? vfs_write+0x354/0xa70 [ 2315.163872] ? fput_many+0x2f/0x1a0 [ 2315.164163] ? ksys_write+0x1a9/0x260 [ 2315.164464] ? __ia32_sys_read+0xb0/0xb0 [ 2315.164786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2315.165195] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2315.165606] ? trace_hardirqs_on+0x5b/0x180 [ 2315.165951] do_syscall_64+0x33/0x40 [ 2315.166243] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2315.166645] RIP: 0033:0x7f3d2b989b19 [ 2315.166937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2315.168393] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2315.168991] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2315.169552] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2315.170110] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2315.170666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2315.171222] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:30:26 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 34) 08:30:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:30:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:30:26 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f00000003c0), 0xa}, 0x50102, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0x9, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r3, 0x2) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000400)={0x1f, 0x40, @none, 0x3}, 0xe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000640)={0x134, r4, 0x400, 0x70bd26, 0x25dfdbff, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @handle=@pci={{0x8}, {0x11}}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_RATE_NODE_NAME={0x9f, 0xa8, @random="8d42c4e79d576b4fc52272f7826407c42efeaf46deaa679a752d66e9ccec0903073357bf7327e3cccfbf4bad5203c4993545d435cf79c8c81628e28ca3c025710750a41e27ff6cbaa684f2d92ea89b7be81feda4a6342fdc10af5229af15e3b7b784f90323bcc085cf0748a02277efece6a199a21a19cc438d5b966a7a32d31cb5bf330bd50f2bee3c5fdb157acf232953b7da1723f2918f9fb4e2"}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @handle=@pci={{0x8}, {0x11}}, @handle=@pci={{0x8}, {0x11}}]}, 0x134}, 0x1, 0x0, 0x0, 0x6c7d6037000ad259}, 0x10) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x2002, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r6) r7 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7]) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r4, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r3}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r6}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000000) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:30:26 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 35) 08:30:26 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a9", 0xf, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:26 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {0x0, 0x0, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:26 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a9", 0xf, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2315.193394] FAULT_INJECTION: forcing a failure. [ 2315.193394] name failslab, interval 1, probability 0, space 0, times 0 [ 2315.195609] CPU: 1 PID: 43300 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2315.196834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2315.198293] Call Trace: [ 2315.198766] dump_stack+0x107/0x167 [ 2315.199415] should_fail.cold+0x5/0xa [ 2315.200094] ? alloc_mnt_ns+0xce/0x420 [ 2315.200785] should_failslab+0x5/0x20 [ 2315.201467] kmem_cache_alloc_trace+0x55/0x320 [ 2315.202278] alloc_mnt_ns+0xce/0x420 [ 2315.202936] copy_mnt_ns+0xae/0xa00 [ 2315.203581] ? kmem_cache_alloc+0x2a6/0x310 [ 2315.204348] create_new_namespaces+0xd6/0xb20 [ 2315.205145] copy_namespaces+0x3fb/0x4f0 [ 2315.205874] copy_process+0x385b/0x7800 [ 2315.206577] ? mark_lock+0xf5/0x2df0 [ 2315.207241] ? lock_acquire+0x197/0x470 [ 2315.207958] ? __cleanup_sighand+0xb0/0xb0 [ 2315.208717] ? _copy_from_user+0xfb/0x1b0 [ 2315.209464] kernel_clone+0xe7/0x980 [ 2315.210112] ? lock_acquire+0x197/0x470 [ 2315.210748] ? create_io_thread+0xf0/0xf0 [ 2315.211425] ? ksys_write+0x21a/0x260 [ 2315.212034] ? lock_downgrade+0x6d0/0x6d0 [ 2315.212698] __do_sys_clone3+0x1e5/0x320 [ 2315.213356] ? __do_sys_clone+0x110/0x110 [ 2315.214036] ? rcu_read_lock_any_held+0x75/0xa0 [ 2315.214771] ? vfs_write+0x354/0xa70 [ 2315.215362] ? fput_many+0x2f/0x1a0 [ 2315.215944] ? ksys_write+0x1a9/0x260 [ 2315.216557] ? __ia32_sys_read+0xb0/0xb0 [ 2315.217208] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2315.218050] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2315.218871] ? trace_hardirqs_on+0x5b/0x180 [ 2315.219566] do_syscall_64+0x33/0x40 [ 2315.220159] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2315.220970] RIP: 0033:0x7f7f3dd15b19 [ 2315.221570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2315.224471] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2315.225681] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2315.226811] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2315.227938] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2315.229075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2315.230222] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:30:26 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 35) 08:30:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0x509ab, 0x800000000000, 0x0, 0x6}, 0x0, 0xc, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r3 = getpgrp(0x0) tgkill(r3, r3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r3, 0x9, r4, 0x3) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r2, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 2315.464349] FAULT_INJECTION: forcing a failure. [ 2315.464349] name failslab, interval 1, probability 0, space 0, times 0 [ 2315.466168] CPU: 1 PID: 43329 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2315.467284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2315.468615] Call Trace: [ 2315.469048] dump_stack+0x107/0x167 [ 2315.469646] should_fail.cold+0x5/0xa [ 2315.470263] ? alloc_vfsmnt+0x23/0x680 [ 2315.470897] should_failslab+0x5/0x20 [ 2315.471512] kmem_cache_alloc+0x5b/0x310 [ 2315.472165] ? rwlock_bug.part.0+0x90/0x90 [ 2315.472852] alloc_vfsmnt+0x23/0x680 [ 2315.473463] clone_mnt+0x6c/0xce0 [ 2315.474025] ? is_subdir+0x1a8/0x320 [ 2315.474630] copy_tree+0x3b0/0xa60 [ 2315.475215] copy_mnt_ns+0x144/0xa00 [ 2315.475819] ? kmem_cache_alloc+0x2a6/0x310 [ 2315.476519] create_new_namespaces+0xd6/0xb20 [ 2315.477249] copy_namespaces+0x3fb/0x4f0 [ 2315.477912] copy_process+0x385b/0x7800 [ 2315.478557] ? mark_lock+0xf5/0x2df0 [ 2315.479164] ? lock_acquire+0x197/0x470 [ 2315.479820] ? __cleanup_sighand+0xb0/0xb0 [ 2315.480511] ? _copy_from_user+0xfb/0x1b0 [ 2315.481185] kernel_clone+0xe7/0x980 [ 2315.481796] ? lock_acquire+0x197/0x470 [ 2315.482436] ? create_io_thread+0xf0/0xf0 [ 2315.483118] ? ksys_write+0x21a/0x260 [ 2315.483733] ? lock_downgrade+0x6d0/0x6d0 [ 2315.484405] __do_sys_clone3+0x1e5/0x320 [ 2315.485057] ? __do_sys_clone+0x110/0x110 [ 2315.485746] ? rcu_read_lock_any_held+0x75/0xa0 [ 2315.486489] ? vfs_write+0x354/0xa70 [ 2315.487090] ? fput_many+0x2f/0x1a0 [ 2315.487676] ? ksys_write+0x1a9/0x260 [ 2315.488290] ? __ia32_sys_read+0xb0/0xb0 [ 2315.488952] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2315.489800] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2315.490623] ? trace_hardirqs_on+0x5b/0x180 [ 2315.491324] do_syscall_64+0x33/0x40 [ 2315.491922] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2315.492747] RIP: 0033:0x7f3d2b989b19 [ 2315.493351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2315.496291] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2315.497523] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2315.498663] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2315.499805] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2315.500941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2315.502092] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:30:41 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 36) 08:30:41 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b736", 0x12, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:41 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x25, &(0x7f0000000080)={0x0, 0x10b8, 0x22}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fea000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000580)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd_index, 0x7fffffff, {0x0, r4}, 0x100009, 0x0, 0x1, {0x0, 0x0, r3}}, 0x0) r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x25, &(0x7f0000000080)={0x0, 0x10b8, 0x22}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fea000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000580)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd_index, 0x7fffffff, {0x0, r8}, 0x100009, 0x0, 0x1, {0x0, 0x0, r7}}, 0x0) syz_io_uring_submit(r5, r10, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd_index=0x9, 0x0, 0x0, 0xe0000, 0x4, 0x0, {0x0, 0x0, r2}}, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:30:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:30:41 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {0x0, 0x0, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:41 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a9", 0xf, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:30:41 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 36) [ 2330.174784] FAULT_INJECTION: forcing a failure. [ 2330.174784] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.176626] CPU: 1 PID: 43360 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2330.177692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2330.178954] Call Trace: [ 2330.179367] dump_stack+0x107/0x167 [ 2330.179932] should_fail.cold+0x5/0xa [ 2330.180522] ? create_object.isra.0+0x3a/0xa20 [ 2330.181228] should_failslab+0x5/0x20 [ 2330.181833] kmem_cache_alloc+0x5b/0x310 [ 2330.182457] ? find_held_lock+0x2c/0x110 [ 2330.183089] create_object.isra.0+0x3a/0xa20 [ 2330.183770] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2330.184557] kmem_cache_alloc+0x159/0x310 [ 2330.185195] ? rwlock_bug.part.0+0x90/0x90 [ 2330.185861] alloc_vfsmnt+0x23/0x680 [ 2330.186439] clone_mnt+0x6c/0xce0 [ 2330.186979] ? is_subdir+0x1a8/0x320 [ 2330.187563] copy_tree+0x3b0/0xa60 [ 2330.188123] copy_mnt_ns+0x144/0xa00 [ 2330.188700] ? kmem_cache_alloc+0x2a6/0x310 [ 2330.189371] create_new_namespaces+0xd6/0xb20 [ 2330.190075] copy_namespaces+0x3fb/0x4f0 [ 2330.190710] copy_process+0x385b/0x7800 [ 2330.191326] ? mark_lock+0xf5/0x2df0 [ 2330.191912] ? lock_acquire+0x197/0x470 [ 2330.192540] ? __cleanup_sighand+0xb0/0xb0 [ 2330.193203] ? _copy_from_user+0xfb/0x1b0 [ 2330.193861] kernel_clone+0xe7/0x980 [ 2330.194436] ? lock_acquire+0x197/0x470 [ 2330.195048] ? create_io_thread+0xf0/0xf0 [ 2330.195702] ? ksys_write+0x21a/0x260 [ 2330.196292] ? lock_downgrade+0x6d0/0x6d0 [ 2330.196935] __do_sys_clone3+0x1e5/0x320 [ 2330.197569] ? __do_sys_clone+0x110/0x110 [ 2330.198230] ? rcu_read_lock_any_held+0x75/0xa0 [ 2330.198944] ? vfs_write+0x354/0xa70 [ 2330.199515] ? fput_many+0x2f/0x1a0 [ 2330.200076] ? ksys_write+0x1a9/0x260 [ 2330.200664] ? __ia32_sys_read+0xb0/0xb0 [ 2330.201292] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2330.202106] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2330.202895] ? trace_hardirqs_on+0x5b/0x180 [ 2330.203564] do_syscall_64+0x33/0x40 [ 2330.204140] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2330.204924] RIP: 0033:0x7f3d2b989b19 [ 2330.205498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.208311] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2330.209487] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2330.210587] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2330.211676] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2330.212765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2330.213863] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2330.225714] FAULT_INJECTION: forcing a failure. [ 2330.225714] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.227703] CPU: 1 PID: 43356 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2330.228770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2330.230054] Call Trace: [ 2330.230465] dump_stack+0x107/0x167 [ 2330.231032] should_fail.cold+0x5/0xa [ 2330.231622] ? create_object.isra.0+0x3a/0xa20 [ 2330.232332] should_failslab+0x5/0x20 [ 2330.232922] kmem_cache_alloc+0x5b/0x310 [ 2330.233564] create_object.isra.0+0x3a/0xa20 [ 2330.234242] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2330.235033] kmem_cache_alloc_trace+0x151/0x320 [ 2330.235759] alloc_mnt_ns+0xce/0x420 [ 2330.236337] copy_mnt_ns+0xae/0xa00 [ 2330.237011] ? kmem_cache_alloc+0x2a6/0x310 [ 2330.237695] create_new_namespaces+0xd6/0xb20 [ 2330.238392] copy_namespaces+0x3fb/0x4f0 [ 2330.239023] copy_process+0x385b/0x7800 [ 2330.239638] ? mark_lock+0xf5/0x2df0 [ 2330.240218] ? lock_acquire+0x197/0x470 [ 2330.240847] ? __cleanup_sighand+0xb0/0xb0 [ 2330.241522] ? _copy_from_user+0xfb/0x1b0 [ 2330.242173] kernel_clone+0xe7/0x980 [ 2330.242750] ? lock_acquire+0x197/0x470 [ 2330.243363] ? create_io_thread+0xf0/0xf0 [ 2330.244016] ? ksys_write+0x21a/0x260 [ 2330.244603] ? lock_downgrade+0x6d0/0x6d0 [ 2330.245247] __do_sys_clone3+0x1e5/0x320 [ 2330.245878] ? __do_sys_clone+0x110/0x110 [ 2330.246536] ? rcu_read_lock_any_held+0x75/0xa0 [ 2330.247251] ? vfs_write+0x354/0xa70 [ 2330.247824] ? fput_many+0x2f/0x1a0 [ 2330.248385] ? ksys_write+0x1a9/0x260 [ 2330.248972] ? __ia32_sys_read+0xb0/0xb0 [ 2330.249612] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2330.250414] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2330.251202] ? trace_hardirqs_on+0x5b/0x180 [ 2330.251868] do_syscall_64+0x33/0x40 [ 2330.252440] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2330.253220] RIP: 0033:0x7f7f3dd15b19 [ 2330.253802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.256604] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2330.257776] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2330.258861] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2330.259946] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2330.261042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2330.262140] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:30:41 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 37) [ 2330.402730] FAULT_INJECTION: forcing a failure. [ 2330.402730] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.404647] CPU: 0 PID: 43376 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2330.405213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2330.405884] Call Trace: [ 2330.406104] dump_stack+0x107/0x167 [ 2330.406399] should_fail.cold+0x5/0xa [ 2330.406707] ? alloc_vfsmnt+0x23/0x680 [ 2330.407029] should_failslab+0x5/0x20 [ 2330.407341] kmem_cache_alloc+0x5b/0x310 [ 2330.407671] ? lock_release+0x680/0x680 [ 2330.407992] alloc_vfsmnt+0x23/0x680 [ 2330.408289] clone_mnt+0x6c/0xce0 [ 2330.408575] copy_tree+0xfe/0xa60 [ 2330.408860] ? down_write_killable+0x180/0x180 [ 2330.409237] copy_mnt_ns+0x144/0xa00 [ 2330.409543] ? kmem_cache_alloc+0x2a6/0x310 [ 2330.409893] create_new_namespaces+0xd6/0xb20 [ 2330.410258] copy_namespaces+0x3fb/0x4f0 [ 2330.410584] copy_process+0x385b/0x7800 [ 2330.410907] ? mark_lock+0xf5/0x2df0 [ 2330.411211] ? lock_acquire+0x197/0x470 [ 2330.411544] ? __cleanup_sighand+0xb0/0xb0 [ 2330.411897] ? _copy_from_user+0xfb/0x1b0 [ 2330.412237] kernel_clone+0xe7/0x980 [ 2330.412537] ? lock_acquire+0x197/0x470 [ 2330.412858] ? create_io_thread+0xf0/0xf0 [ 2330.413206] ? ksys_write+0x21a/0x260 [ 2330.413525] ? lock_downgrade+0x6d0/0x6d0 [ 2330.413863] __do_sys_clone3+0x1e5/0x320 [ 2330.414197] ? __do_sys_clone+0x110/0x110 [ 2330.414546] ? rcu_read_lock_any_held+0x75/0xa0 [ 2330.414924] ? vfs_write+0x354/0xa70 [ 2330.415221] ? fput_many+0x2f/0x1a0 [ 2330.415513] ? ksys_write+0x1a9/0x260 [ 2330.415821] ? __ia32_sys_read+0xb0/0xb0 [ 2330.416154] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2330.416574] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2330.416993] ? trace_hardirqs_on+0x5b/0x180 [ 2330.417341] do_syscall_64+0x33/0x40 [ 2330.417645] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2330.418225] RIP: 0033:0x7f7f3dd15b19 [ 2330.418524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.419983] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2330.420592] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2330.421158] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2330.421732] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2330.422298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2330.422865] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:30:41 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 38) [ 2330.451678] FAULT_INJECTION: forcing a failure. [ 2330.451678] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.452627] CPU: 0 PID: 43378 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2330.453194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2330.453865] Call Trace: [ 2330.454078] dump_stack+0x107/0x167 [ 2330.454376] should_fail.cold+0x5/0xa [ 2330.454687] ? create_object.isra.0+0x3a/0xa20 [ 2330.455052] should_failslab+0x5/0x20 [ 2330.455363] kmem_cache_alloc+0x5b/0x310 [ 2330.455696] ? kfree+0x1ab/0x340 [ 2330.455976] create_object.isra.0+0x3a/0xa20 [ 2330.456328] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2330.456742] kmem_cache_alloc+0x159/0x310 [ 2330.457073] ? lock_release+0x680/0x680 [ 2330.457397] alloc_vfsmnt+0x23/0x680 [ 2330.457700] clone_mnt+0x6c/0xce0 [ 2330.457994] copy_tree+0xfe/0xa60 [ 2330.458273] ? down_write_killable+0x180/0x180 [ 2330.458647] copy_mnt_ns+0x144/0xa00 [ 2330.458945] ? kmem_cache_alloc+0x2a6/0x310 [ 2330.459294] create_new_namespaces+0xd6/0xb20 [ 2330.459654] copy_namespaces+0x3fb/0x4f0 [ 2330.459998] copy_process+0x385b/0x7800 [ 2330.460321] ? mark_lock+0xf5/0x2df0 [ 2330.460628] ? lock_acquire+0x197/0x470 [ 2330.461122] ? __cleanup_sighand+0xb0/0xb0 [ 2330.461525] ? _copy_from_user+0xfb/0x1b0 [ 2330.461863] kernel_clone+0xe7/0x980 [ 2330.462166] ? lock_acquire+0x197/0x470 [ 2330.462483] ? create_io_thread+0xf0/0xf0 [ 2330.462835] ? ksys_write+0x21a/0x260 [ 2330.463145] ? lock_downgrade+0x6d0/0x6d0 [ 2330.463482] __do_sys_clone3+0x1e5/0x320 [ 2330.463808] ? __do_sys_clone+0x110/0x110 [ 2330.464169] ? rcu_read_lock_any_held+0x75/0xa0 [ 2330.464545] ? vfs_write+0x354/0xa70 [ 2330.464852] ? fput_many+0x2f/0x1a0 [ 2330.465146] ? ksys_write+0x1a9/0x260 [ 2330.465462] ? __ia32_sys_read+0xb0/0xb0 [ 2330.465795] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2330.466222] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2330.466628] ? trace_hardirqs_on+0x5b/0x180 [ 2330.466983] do_syscall_64+0x33/0x40 [ 2330.467282] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2330.467696] RIP: 0033:0x7f7f3dd15b19 [ 2330.467994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.469437] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2330.470043] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2330.470618] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2330.471189] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2330.471765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2330.472345] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:30:41 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 37) [ 2330.518306] FAULT_INJECTION: forcing a failure. [ 2330.518306] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.519355] CPU: 0 PID: 43380 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2330.519939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2330.520645] Call Trace: [ 2330.520868] dump_stack+0x107/0x167 [ 2330.521174] should_fail.cold+0x5/0xa [ 2330.521498] should_failslab+0x5/0x20 [ 2330.521824] __kmalloc_track_caller+0x79/0x370 [ 2330.522201] ? kstrdup_const+0x53/0x80 [ 2330.522531] kstrdup+0x36/0x70 [ 2330.522799] kstrdup_const+0x53/0x80 [ 2330.523107] alloc_vfsmnt+0xb5/0x680 [ 2330.523414] clone_mnt+0x6c/0xce0 [ 2330.523701] ? is_subdir+0x1a8/0x320 [ 2330.524009] copy_tree+0x3b0/0xa60 [ 2330.524302] copy_mnt_ns+0x144/0xa00 [ 2330.524608] ? kmem_cache_alloc+0x2a6/0x310 [ 2330.524971] create_new_namespaces+0xd6/0xb20 [ 2330.525337] copy_namespaces+0x3fb/0x4f0 [ 2330.525678] copy_process+0x385b/0x7800 [ 2330.526015] ? mark_lock+0xf5/0x2df0 [ 2330.526319] ? lock_acquire+0x197/0x470 [ 2330.526656] ? __cleanup_sighand+0xb0/0xb0 [ 2330.527010] ? _copy_from_user+0xfb/0x1b0 [ 2330.527351] kernel_clone+0xe7/0x980 [ 2330.527653] ? lock_acquire+0x197/0x470 [ 2330.527982] ? create_io_thread+0xf0/0xf0 [ 2330.528331] ? ksys_write+0x21a/0x260 [ 2330.528640] ? lock_downgrade+0x6d0/0x6d0 [ 2330.528979] __do_sys_clone3+0x1e5/0x320 [ 2330.529305] ? __do_sys_clone+0x110/0x110 [ 2330.529665] ? rcu_read_lock_any_held+0x75/0xa0 [ 2330.530043] ? vfs_write+0x354/0xa70 [ 2330.530345] ? fput_many+0x2f/0x1a0 [ 2330.530639] ? ksys_write+0x1a9/0x260 [ 2330.530950] ? __ia32_sys_read+0xb0/0xb0 [ 2330.531285] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2330.531709] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2330.532130] ? trace_hardirqs_on+0x5b/0x180 [ 2330.532483] do_syscall_64+0x33/0x40 [ 2330.532782] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2330.533196] RIP: 0033:0x7f3d2b989b19 [ 2330.533498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.534995] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2330.535606] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2330.536165] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2330.536730] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2330.537293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2330.537870] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:30:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:30:56 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 38) 08:30:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:30:56 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {0x0, 0x0, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:57 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b736", 0x12, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:57 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 39) 08:30:57 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b736", 0x12, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:57 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) lseek(0xffffffffffffffff, 0x7, 0x2) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r2 = getpgrp(0x0) tgkill(r2, r2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x1606, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0xe}, 0x50d2, 0x9, 0x0, 0x0, 0x100000000000003, 0x7, 0x4, 0x0, 0x20}, r2, 0x9, r3, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) close(0xffffffffffffffff) r4 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000180)={0x1f, 0xff, @any, 0x5, 0x2}, 0xe) sendmmsg(r1, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 2345.979273] FAULT_INJECTION: forcing a failure. [ 2345.979273] name failslab, interval 1, probability 0, space 0, times 0 [ 2345.980869] CPU: 1 PID: 43392 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2345.981814] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2345.982906] Call Trace: [ 2345.983266] dump_stack+0x107/0x167 [ 2345.983755] should_fail.cold+0x5/0xa [ 2345.984304] ? create_object.isra.0+0x3a/0xa20 [ 2345.984918] should_failslab+0x5/0x20 [ 2345.985441] kmem_cache_alloc+0x5b/0x310 [ 2345.986020] create_object.isra.0+0x3a/0xa20 [ 2345.986627] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2345.987325] __kmalloc_track_caller+0x177/0x370 [ 2345.987960] ? kstrdup_const+0x53/0x80 [ 2345.988529] kstrdup+0x36/0x70 [ 2345.988984] kstrdup_const+0x53/0x80 [ 2345.989528] alloc_vfsmnt+0xb5/0x680 [ 2345.990062] clone_mnt+0x6c/0xce0 [ 2345.990536] ? is_subdir+0x1a8/0x320 [ 2345.991051] copy_tree+0x3b0/0xa60 [ 2345.991548] copy_mnt_ns+0x144/0xa00 [ 2345.992060] ? kmem_cache_alloc+0x2a6/0x310 [ 2345.992654] create_new_namespaces+0xd6/0xb20 [ 2345.993299] copy_namespaces+0x3fb/0x4f0 [ 2345.993866] copy_process+0x385b/0x7800 [ 2345.994421] ? mark_lock+0xf5/0x2df0 [ 2345.994927] ? lock_acquire+0x197/0x470 [ 2345.995499] ? __cleanup_sighand+0xb0/0xb0 [ 2345.996085] ? _copy_from_user+0xfb/0x1b0 [ 2345.996652] kernel_clone+0xe7/0x980 [ 2345.997159] ? lock_acquire+0x197/0x470 [ 2345.997716] ? create_io_thread+0xf0/0xf0 [ 2345.998313] ? ksys_write+0x21a/0x260 [ 2345.998838] ? lock_downgrade+0x6d0/0x6d0 [ 2345.999433] __do_sys_clone3+0x1e5/0x320 [ 2346.000013] ? __do_sys_clone+0x110/0x110 [ 2346.000627] ? rcu_read_lock_any_held+0x75/0xa0 [ 2346.001269] ? vfs_write+0x354/0xa70 [ 2346.001789] ? fput_many+0x2f/0x1a0 [ 2346.002302] ? ksys_write+0x1a9/0x260 [ 2346.002825] ? __ia32_sys_read+0xb0/0xb0 [ 2346.003582] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2346.004390] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2346.005099] ? trace_hardirqs_on+0x5b/0x180 [ 2346.005713] do_syscall_64+0x33/0x40 [ 2346.006238] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2346.006940] RIP: 0033:0x7f3d2b989b19 [ 2346.007456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.010032] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2346.011095] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2346.012080] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2346.013048] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2346.014041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2346.015010] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2346.078078] FAULT_INJECTION: forcing a failure. [ 2346.078078] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.080104] CPU: 0 PID: 43405 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2346.081077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.082249] Call Trace: [ 2346.082627] dump_stack+0x107/0x167 [ 2346.083155] should_fail.cold+0x5/0xa [ 2346.083700] ? create_object.isra.0+0x3a/0xa20 [ 2346.084342] should_failslab+0x5/0x20 [ 2346.084881] kmem_cache_alloc+0x5b/0x310 [ 2346.085464] create_object.isra.0+0x3a/0xa20 [ 2346.086092] kmemleak_alloc_percpu+0xa0/0x100 [ 2346.086724] pcpu_alloc+0x4e2/0x1240 [ 2346.087273] alloc_vfsmnt+0xfd/0x680 [ 2346.087815] clone_mnt+0x6c/0xce0 [ 2346.088315] copy_tree+0xfe/0xa60 [ 2346.088810] ? down_write_killable+0x180/0x180 [ 2346.089454] copy_mnt_ns+0x144/0xa00 [ 2346.089989] ? kmem_cache_alloc+0x2a6/0x310 [ 2346.090613] create_new_namespaces+0xd6/0xb20 [ 2346.091246] copy_namespaces+0x3fb/0x4f0 [ 2346.091817] copy_process+0x385b/0x7800 [ 2346.092375] ? mark_lock+0xf5/0x2df0 [ 2346.092905] ? lock_acquire+0x197/0x470 [ 2346.093507] ? __cleanup_sighand+0xb0/0xb0 [ 2346.094140] ? _copy_from_user+0xfb/0x1b0 [ 2346.094737] kernel_clone+0xe7/0x980 [ 2346.095260] ? lock_acquire+0x197/0x470 [ 2346.095817] ? create_io_thread+0xf0/0xf0 [ 2346.096435] ? ksys_write+0x21a/0x260 [ 2346.097005] ? lock_downgrade+0x6d0/0x6d0 [ 2346.097620] __do_sys_clone3+0x1e5/0x320 [ 2346.098214] ? __do_sys_clone+0x110/0x110 [ 2346.098830] ? rcu_read_lock_any_held+0x75/0xa0 [ 2346.099505] ? vfs_write+0x354/0xa70 [ 2346.100049] ? fput_many+0x2f/0x1a0 [ 2346.100578] ? ksys_write+0x1a9/0x260 [ 2346.101113] ? __ia32_sys_read+0xb0/0xb0 [ 2346.101690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2346.102461] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2346.103187] ? trace_hardirqs_on+0x5b/0x180 [ 2346.103816] do_syscall_64+0x33/0x40 [ 2346.104336] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2346.105060] RIP: 0033:0x7f7f3dd15b19 [ 2346.105589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.108132] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2346.109211] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2346.110247] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2346.111258] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2346.112282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2346.113313] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:30:57 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 39) [ 2346.413465] FAULT_INJECTION: forcing a failure. [ 2346.413465] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.415540] CPU: 1 PID: 43421 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2346.416574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.417852] Call Trace: [ 2346.418253] dump_stack+0x107/0x167 [ 2346.418807] should_fail.cold+0x5/0xa [ 2346.419379] ? create_object.isra.0+0x3a/0xa20 [ 2346.420061] should_failslab+0x5/0x20 [ 2346.420632] kmem_cache_alloc+0x5b/0x310 [ 2346.421244] create_object.isra.0+0x3a/0xa20 [ 2346.421939] kmemleak_alloc_percpu+0xa0/0x100 [ 2346.422612] pcpu_alloc+0x4e2/0x1240 [ 2346.423193] alloc_vfsmnt+0xfd/0x680 [ 2346.423753] clone_mnt+0x6c/0xce0 [ 2346.424276] ? is_subdir+0x1a8/0x320 [ 2346.424837] copy_tree+0x3b0/0xa60 [ 2346.425379] copy_mnt_ns+0x144/0xa00 [ 2346.425943] ? kmem_cache_alloc+0x2a6/0x310 [ 2346.426596] create_new_namespaces+0xd6/0xb20 [ 2346.427270] copy_namespaces+0x3fb/0x4f0 [ 2346.427875] copy_process+0x385b/0x7800 [ 2346.428469] ? mark_lock+0xf5/0x2df0 [ 2346.429028] ? lock_acquire+0x197/0x470 [ 2346.429641] ? __cleanup_sighand+0xb0/0xb0 [ 2346.430309] ? _copy_from_user+0xfb/0x1b0 [ 2346.430934] kernel_clone+0xe7/0x980 [ 2346.431485] ? lock_acquire+0x197/0x470 [ 2346.432072] ? create_io_thread+0xf0/0xf0 [ 2346.432698] ? ksys_write+0x21a/0x260 [ 2346.433267] ? lock_downgrade+0x6d0/0x6d0 [ 2346.433893] __do_sys_clone3+0x1e5/0x320 [ 2346.434498] ? __do_sys_clone+0x110/0x110 [ 2346.435128] ? rcu_read_lock_any_held+0x75/0xa0 [ 2346.435812] ? vfs_write+0x354/0xa70 [ 2346.436364] ? fput_many+0x2f/0x1a0 [ 2346.436909] ? ksys_write+0x1a9/0x260 [ 2346.437472] ? __ia32_sys_read+0xb0/0xb0 [ 2346.438094] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2346.438888] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2346.439676] ? trace_hardirqs_on+0x5b/0x180 [ 2346.440340] do_syscall_64+0x33/0x40 [ 2346.440911] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2346.441695] RIP: 0033:0x7f3d2b989b19 [ 2346.442280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.445070] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2346.446239] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2346.447325] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2346.448417] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2346.449509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2346.450605] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:30:57 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 40) [ 2346.575681] FAULT_INJECTION: forcing a failure. [ 2346.575681] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.577737] CPU: 1 PID: 43423 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2346.578797] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.580065] Call Trace: [ 2346.580478] dump_stack+0x107/0x167 [ 2346.581043] should_fail.cold+0x5/0xa [ 2346.581637] ? create_object.isra.0+0x3a/0xa20 [ 2346.582352] should_failslab+0x5/0x20 [ 2346.582939] kmem_cache_alloc+0x5b/0x310 [ 2346.583568] create_object.isra.0+0x3a/0xa20 [ 2346.584256] kmemleak_alloc_percpu+0xa0/0x100 [ 2346.584957] pcpu_alloc+0x4e2/0x1240 [ 2346.585547] alloc_vfsmnt+0xfd/0x680 [ 2346.586137] clone_mnt+0x6c/0xce0 [ 2346.586693] copy_tree+0xfe/0xa60 [ 2346.587232] ? down_write_killable+0x180/0x180 [ 2346.587942] copy_mnt_ns+0x144/0xa00 [ 2346.588522] ? kmem_cache_alloc+0x2a6/0x310 [ 2346.589192] create_new_namespaces+0xd6/0xb20 [ 2346.589902] copy_namespaces+0x3fb/0x4f0 [ 2346.590536] copy_process+0x385b/0x7800 [ 2346.591151] ? mark_lock+0xf5/0x2df0 [ 2346.591734] ? lock_acquire+0x197/0x470 [ 2346.592368] ? __cleanup_sighand+0xb0/0xb0 [ 2346.593033] ? _copy_from_user+0xfb/0x1b0 [ 2346.593679] kernel_clone+0xe7/0x980 [ 2346.594267] ? lock_acquire+0x197/0x470 [ 2346.594877] ? create_io_thread+0xf0/0xf0 [ 2346.595528] ? ksys_write+0x21a/0x260 [ 2346.596110] ? lock_downgrade+0x6d0/0x6d0 [ 2346.596753] __do_sys_clone3+0x1e5/0x320 [ 2346.597377] ? __do_sys_clone+0x110/0x110 [ 2346.598052] ? rcu_read_lock_any_held+0x75/0xa0 [ 2346.598766] ? vfs_write+0x354/0xa70 [ 2346.599342] ? fput_many+0x2f/0x1a0 [ 2346.599904] ? ksys_write+0x1a9/0x260 [ 2346.600487] ? __ia32_sys_read+0xb0/0xb0 [ 2346.601119] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2346.601925] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2346.602711] ? trace_hardirqs_on+0x5b/0x180 [ 2346.603382] do_syscall_64+0x33/0x40 [ 2346.603956] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2346.604744] RIP: 0033:0x7f7f3dd15b19 [ 2346.605319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.608134] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2346.609302] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2346.610400] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2346.611493] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2346.612583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2346.613674] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:30:57 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 41) 08:30:57 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 40) [ 2346.807409] FAULT_INJECTION: forcing a failure. [ 2346.807409] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.809372] CPU: 0 PID: 43427 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2346.810402] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.811569] Call Trace: [ 2346.811965] dump_stack+0x107/0x167 [ 2346.812502] should_fail.cold+0x5/0xa [ 2346.813073] ? alloc_vfsmnt+0x23/0x680 [ 2346.813653] should_failslab+0x5/0x20 [ 2346.814217] kmem_cache_alloc+0x5b/0x310 [ 2346.814815] ? rwlock_bug.part.0+0x90/0x90 [ 2346.815444] alloc_vfsmnt+0x23/0x680 [ 2346.815993] clone_mnt+0x6c/0xce0 [ 2346.816500] ? is_subdir+0x1a8/0x320 [ 2346.817050] copy_tree+0x3b0/0xa60 [ 2346.817585] copy_mnt_ns+0x144/0xa00 [ 2346.818122] ? kmem_cache_alloc+0x2a6/0x310 [ 2346.818757] create_new_namespaces+0xd6/0xb20 [ 2346.819397] copy_namespaces+0x3fb/0x4f0 [ 2346.819993] copy_process+0x385b/0x7800 [ 2346.820552] ? mark_lock+0xf5/0x2df0 [ 2346.821107] ? lock_acquire+0x197/0x470 [ 2346.821680] ? __cleanup_sighand+0xb0/0xb0 [ 2346.822326] ? _copy_from_user+0xfb/0x1b0 [ 2346.822932] kernel_clone+0xe7/0x980 [ 2346.823483] ? lock_acquire+0x197/0x470 [ 2346.824060] ? create_io_thread+0xf0/0xf0 [ 2346.824686] ? ksys_write+0x21a/0x260 [ 2346.825243] ? lock_downgrade+0x6d0/0x6d0 [ 2346.825863] __do_sys_clone3+0x1e5/0x320 [ 2346.826447] ? __do_sys_clone+0x110/0x110 [ 2346.827061] ? rcu_read_lock_any_held+0x75/0xa0 [ 2346.827725] ? vfs_write+0x354/0xa70 [ 2346.828266] ? fput_many+0x2f/0x1a0 [ 2346.828795] ? ksys_write+0x1a9/0x260 [ 2346.829343] ? __ia32_sys_read+0xb0/0xb0 [ 2346.829943] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2346.830695] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2346.831431] ? trace_hardirqs_on+0x5b/0x180 [ 2346.832060] do_syscall_64+0x33/0x40 [ 2346.832595] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2346.833330] RIP: 0033:0x7f7f3dd15b19 [ 2346.833879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.836510] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2346.837600] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2346.838615] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2346.839628] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2346.840643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2346.841659] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:30:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:30:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2346.906579] FAULT_INJECTION: forcing a failure. [ 2346.906579] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.908450] CPU: 1 PID: 43432 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2346.909542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.910857] Call Trace: [ 2346.911281] dump_stack+0x107/0x167 [ 2346.911863] should_fail.cold+0x5/0xa [ 2346.912470] ? create_object.isra.0+0x3a/0xa20 [ 2346.913196] should_failslab+0x5/0x20 [ 2346.913809] kmem_cache_alloc+0x5b/0x310 [ 2346.914457] ? mark_held_locks+0x9e/0xe0 [ 2346.915103] create_object.isra.0+0x3a/0xa20 [ 2346.915806] kmemleak_alloc_percpu+0xa0/0x100 [ 2346.916520] pcpu_alloc+0x4e2/0x1240 [ 2346.917117] alloc_vfsmnt+0xfd/0x680 [ 2346.917728] clone_mnt+0x6c/0xce0 [ 2346.918283] ? is_subdir+0x1a8/0x320 [ 2346.918878] copy_tree+0x3b0/0xa60 [ 2346.919453] copy_mnt_ns+0x144/0xa00 [ 2346.920047] ? kmem_cache_alloc+0x2a6/0x310 [ 2346.920738] create_new_namespaces+0xd6/0xb20 [ 2346.921455] copy_namespaces+0x3fb/0x4f0 [ 2346.922112] copy_process+0x385b/0x7800 [ 2346.922745] ? mark_lock+0xf5/0x2df0 [ 2346.923342] ? lock_acquire+0x197/0x470 [ 2346.923991] ? __cleanup_sighand+0xb0/0xb0 [ 2346.924674] ? _copy_from_user+0xfb/0x1b0 [ 2346.925338] kernel_clone+0xe7/0x980 [ 2346.925936] ? lock_acquire+0x197/0x470 [ 2346.926564] ? create_io_thread+0xf0/0xf0 [ 2346.927235] ? ksys_write+0x21a/0x260 [ 2346.927842] ? lock_downgrade+0x6d0/0x6d0 [ 2346.928501] __do_sys_clone3+0x1e5/0x320 08:30:57 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) bind$bt_l2cap(r0, &(0x7f0000000180)={0x1f, 0x40, @any, 0x3}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 2346.929144] ? __do_sys_clone+0x110/0x110 [ 2346.929967] ? rcu_read_lock_any_held+0x75/0xa0 [ 2346.930675] ? vfs_write+0x354/0xa70 [ 2346.931245] ? fput_many+0x2f/0x1a0 [ 2346.931802] ? ksys_write+0x1a9/0x260 [ 2346.932385] ? __ia32_sys_read+0xb0/0xb0 [ 2346.933007] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2346.933804] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2346.934552] ? trace_hardirqs_on+0x5b/0x180 [ 2346.935218] do_syscall_64+0x33/0x40 [ 2346.935786] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2346.936562] RIP: 0033:0x7f3d2b989b19 [ 2346.937116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.939893] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2346.941005] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2346.942097] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2346.943180] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2346.944262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2346.945346] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:30:58 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b736", 0x12, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:58 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400), 0x0, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:58 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 42) 08:30:58 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b736", 0x12, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:58 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 41) [ 2347.140477] FAULT_INJECTION: forcing a failure. [ 2347.140477] name failslab, interval 1, probability 0, space 0, times 0 [ 2347.142312] CPU: 1 PID: 43456 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2347.143372] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2347.144644] Call Trace: [ 2347.145056] dump_stack+0x107/0x167 [ 2347.145625] should_fail.cold+0x5/0xa [ 2347.146226] ? alloc_vfsmnt+0x23/0x680 [ 2347.146834] should_failslab+0x5/0x20 [ 2347.147424] kmem_cache_alloc+0x5b/0x310 [ 2347.148052] ? copy_tree+0x61a/0xa60 [ 2347.148631] alloc_vfsmnt+0x23/0x680 [ 2347.149192] clone_mnt+0x6c/0xce0 [ 2347.149745] copy_tree+0x3b0/0xa60 [ 2347.150292] copy_mnt_ns+0x144/0xa00 [ 2347.150869] ? kmem_cache_alloc+0x2a6/0x310 [ 2347.151629] create_new_namespaces+0xd6/0xb20 [ 2347.152332] copy_namespaces+0x3fb/0x4f0 [ 2347.152953] copy_process+0x385b/0x7800 [ 2347.153571] ? mark_lock+0xf5/0x2df0 [ 2347.154141] ? lock_acquire+0x197/0x470 [ 2347.154771] ? __cleanup_sighand+0xb0/0xb0 [ 2347.155434] ? _copy_from_user+0xfb/0x1b0 [ 2347.156081] kernel_clone+0xe7/0x980 [ 2347.156653] ? lock_acquire+0x197/0x470 [ 2347.157265] ? create_io_thread+0xf0/0xf0 [ 2347.157928] ? ksys_write+0x21a/0x260 [ 2347.158515] ? lock_downgrade+0x6d0/0x6d0 [ 2347.159159] __do_sys_clone3+0x1e5/0x320 [ 2347.159785] ? __do_sys_clone+0x110/0x110 [ 2347.160421] ? rcu_read_lock_any_held+0x75/0xa0 [ 2347.161137] ? vfs_write+0x354/0xa70 [ 2347.161701] ? fput_many+0x2f/0x1a0 [ 2347.162275] ? ksys_write+0x1a9/0x260 [ 2347.162847] ? __ia32_sys_read+0xb0/0xb0 [ 2347.163476] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2347.164249] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2347.165036] ? trace_hardirqs_on+0x5b/0x180 [ 2347.165700] do_syscall_64+0x33/0x40 [ 2347.166284] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2347.167067] RIP: 0033:0x7f3d2b989b19 [ 2347.167638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2347.170430] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2347.171609] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2347.172699] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2347.173811] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2347.174893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2347.175993] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2347.181465] FAULT_INJECTION: forcing a failure. [ 2347.181465] name failslab, interval 1, probability 0, space 0, times 0 [ 2347.183444] CPU: 1 PID: 43453 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2347.184503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2347.185766] Call Trace: [ 2347.186175] dump_stack+0x107/0x167 [ 2347.186739] should_fail.cold+0x5/0xa [ 2347.187328] ? create_object.isra.0+0x3a/0xa20 [ 2347.188031] should_failslab+0x5/0x20 [ 2347.188618] kmem_cache_alloc+0x5b/0x310 [ 2347.189246] ? find_held_lock+0x2c/0x110 [ 2347.189889] create_object.isra.0+0x3a/0xa20 [ 2347.190580] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2347.191376] kmem_cache_alloc+0x159/0x310 [ 2347.192027] ? rwlock_bug.part.0+0x90/0x90 [ 2347.192690] alloc_vfsmnt+0x23/0x680 [ 2347.193274] clone_mnt+0x6c/0xce0 [ 2347.193831] ? is_subdir+0x1a8/0x320 [ 2347.194417] copy_tree+0x3b0/0xa60 [ 2347.194990] copy_mnt_ns+0x144/0xa00 [ 2347.195566] ? kmem_cache_alloc+0x2a6/0x310 [ 2347.196233] create_new_namespaces+0xd6/0xb20 [ 2347.196914] copy_namespaces+0x3fb/0x4f0 [ 2347.197541] copy_process+0x385b/0x7800 [ 2347.198138] ? mark_lock+0xf5/0x2df0 [ 2347.198721] ? lock_acquire+0x197/0x470 [ 2347.199331] ? __cleanup_sighand+0xb0/0xb0 [ 2347.199996] ? _copy_from_user+0xfb/0x1b0 [ 2347.200625] kernel_clone+0xe7/0x980 [ 2347.201197] ? lock_acquire+0x197/0x470 [ 2347.201821] ? create_io_thread+0xf0/0xf0 [ 2347.202488] ? ksys_write+0x21a/0x260 [ 2347.203072] ? lock_downgrade+0x6d0/0x6d0 [ 2347.203718] __do_sys_clone3+0x1e5/0x320 [ 2347.204332] ? __do_sys_clone+0x110/0x110 [ 2347.204995] ? rcu_read_lock_any_held+0x75/0xa0 [ 2347.205701] ? vfs_write+0x354/0xa70 [ 2347.206303] ? fput_many+0x2f/0x1a0 [ 2347.206853] ? ksys_write+0x1a9/0x260 [ 2347.207452] ? __ia32_sys_read+0xb0/0xb0 [ 2347.208060] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2347.208862] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2347.209641] ? trace_hardirqs_on+0x5b/0x180 [ 2347.210314] do_syscall_64+0x33/0x40 [ 2347.210871] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2347.211661] RIP: 0033:0x7f7f3dd15b19 [ 2347.212220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2347.215044] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2347.216452] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2347.217853] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2347.219212] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2347.220571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2347.221914] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:30:58 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 42) [ 2347.355985] FAULT_INJECTION: forcing a failure. [ 2347.355985] name failslab, interval 1, probability 0, space 0, times 0 [ 2347.357157] CPU: 0 PID: 43465 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2347.357865] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2347.358700] Call Trace: [ 2347.358974] dump_stack+0x107/0x167 [ 2347.359351] should_fail.cold+0x5/0xa [ 2347.359741] ? create_object.isra.0+0x3a/0xa20 [ 2347.360207] should_failslab+0x5/0x20 [ 2347.360595] kmem_cache_alloc+0x5b/0x310 [ 2347.361006] ? find_held_lock+0x2c/0x110 [ 2347.361418] create_object.isra.0+0x3a/0xa20 [ 2347.361852] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2347.362370] kmem_cache_alloc+0x159/0x310 [ 2347.362794] alloc_vfsmnt+0x23/0x680 [ 2347.363180] clone_mnt+0x6c/0xce0 [ 2347.363538] copy_tree+0x3b0/0xa60 [ 2347.363903] copy_mnt_ns+0x144/0xa00 [ 2347.364281] ? kmem_cache_alloc+0x2a6/0x310 [ 2347.364726] create_new_namespaces+0xd6/0xb20 [ 2347.365189] copy_namespaces+0x3fb/0x4f0 [ 2347.365592] copy_process+0x385b/0x7800 [ 2347.366003] ? mark_lock+0xf5/0x2df0 [ 2347.366386] ? lock_acquire+0x197/0x470 [ 2347.366801] ? __cleanup_sighand+0xb0/0xb0 [ 2347.367240] ? _copy_from_user+0xfb/0x1b0 [ 2347.367668] kernel_clone+0xe7/0x980 [ 2347.368051] ? lock_acquire+0x197/0x470 [ 2347.368452] ? create_io_thread+0xf0/0xf0 [ 2347.368880] ? ksys_write+0x21a/0x260 [ 2347.369265] ? lock_downgrade+0x6d0/0x6d0 [ 2347.369672] __do_sys_clone3+0x1e5/0x320 [ 2347.370094] ? __do_sys_clone+0x110/0x110 [ 2347.370533] ? rcu_read_lock_any_held+0x75/0xa0 [ 2347.371011] ? vfs_write+0x354/0xa70 [ 2347.371393] ? fput_many+0x2f/0x1a0 [ 2347.371769] ? ksys_write+0x1a9/0x260 [ 2347.372163] ? __ia32_sys_read+0xb0/0xb0 [ 2347.372576] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2347.373104] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2347.373609] ? trace_hardirqs_on+0x5b/0x180 [ 2347.374068] do_syscall_64+0x33/0x40 [ 2347.374449] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2347.374957] RIP: 0033:0x7f3d2b989b19 [ 2347.375338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2347.377192] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2347.377975] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2347.378696] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2347.379416] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2347.380131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2347.380845] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:30:58 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c", 0x13, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:30:58 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 43) [ 2347.476078] FAULT_INJECTION: forcing a failure. [ 2347.476078] name failslab, interval 1, probability 0, space 0, times 0 [ 2347.477999] CPU: 1 PID: 43469 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2347.479101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2347.480420] Call Trace: [ 2347.480851] dump_stack+0x107/0x167 [ 2347.481464] should_fail.cold+0x5/0xa [ 2347.482087] ? create_object.isra.0+0x3a/0xa20 [ 2347.482816] should_failslab+0x5/0x20 [ 2347.483426] kmem_cache_alloc+0x5b/0x310 [ 2347.484074] ? find_held_lock+0x2c/0x110 [ 2347.484728] create_object.isra.0+0x3a/0xa20 [ 2347.485432] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2347.486253] kmem_cache_alloc+0x159/0x310 [ 2347.486920] alloc_vfsmnt+0x23/0x680 [ 2347.487519] clone_mnt+0x6c/0xce0 [ 2347.488084] copy_tree+0x3b0/0xa60 [ 2347.488664] copy_mnt_ns+0x144/0xa00 [ 2347.489262] ? kmem_cache_alloc+0x2a6/0x310 [ 2347.489965] create_new_namespaces+0xd6/0xb20 [ 2347.490686] copy_namespaces+0x3fb/0x4f0 [ 2347.491337] copy_process+0x385b/0x7800 [ 2347.491971] ? mark_lock+0xf5/0x2df0 [ 2347.492573] ? lock_acquire+0x197/0x470 [ 2347.493223] ? __cleanup_sighand+0xb0/0xb0 [ 2347.493917] ? _copy_from_user+0xfb/0x1b0 [ 2347.494581] kernel_clone+0xe7/0x980 [ 2347.495174] ? lock_acquire+0x197/0x470 [ 2347.495806] ? create_io_thread+0xf0/0xf0 [ 2347.496478] ? ksys_write+0x21a/0x260 [ 2347.497082] ? lock_downgrade+0x6d0/0x6d0 [ 2347.497749] __do_sys_clone3+0x1e5/0x320 [ 2347.498396] ? __do_sys_clone+0x110/0x110 [ 2347.499073] ? rcu_read_lock_any_held+0x75/0xa0 [ 2347.499808] ? vfs_write+0x354/0xa70 [ 2347.500398] ? fput_many+0x2f/0x1a0 [ 2347.500979] ? ksys_write+0x1a9/0x260 [ 2347.501587] ? __ia32_sys_read+0xb0/0xb0 [ 2347.502244] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2347.503075] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2347.503889] ? trace_hardirqs_on+0x5b/0x180 [ 2347.504578] do_syscall_64+0x33/0x40 [ 2347.505169] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2347.505987] RIP: 0033:0x7f3d2b989b19 [ 2347.506579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2347.509477] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2347.510690] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2347.511815] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2347.512938] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2347.514072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2347.515199] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:31:13 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c", 0x13, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:31:13 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b736", 0x12, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:31:13 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x6, 0x3, 0x20, 0x50, 0x0, 0x7, 0x1110, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x400, 0xe126, 0x10000, 0x5, 0x80, 0x4, 0x7, 0x0, 0x8000, 0x0, 0x1ff}, r1, 0x6, r0, 0x1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r3 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x20, 0x1f, 0x1, 0xa6, 0x0, 0x6facbcf, 0x200, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x2, 0xffffffffffffffe0, 0x1, 0x9, 0x800, 0x2, 0x7ff, 0x0, 0x9, 0x0, 0x100000000}, r3, 0x3, 0xffffffffffffffff, 0x1) tgkill(r3, r3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r3, 0x9, r4, 0x3) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r2, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:31:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:31:13 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 44) 08:31:13 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 43) 08:31:13 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400), 0x0, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:31:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2362.024219] FAULT_INJECTION: forcing a failure. [ 2362.024219] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.026045] CPU: 1 PID: 43493 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2362.027038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.028280] Call Trace: [ 2362.028669] dump_stack+0x107/0x167 [ 2362.029225] should_fail.cold+0x5/0xa [ 2362.029781] ? create_object.isra.0+0x3a/0xa20 [ 2362.030476] should_failslab+0x5/0x20 [ 2362.031050] kmem_cache_alloc+0x5b/0x310 [ 2362.031669] create_object.isra.0+0x3a/0xa20 [ 2362.032331] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2362.033099] __kmalloc_track_caller+0x177/0x370 [ 2362.033799] ? kstrdup_const+0x53/0x80 [ 2362.034416] kstrdup+0x36/0x70 [ 2362.034903] kstrdup_const+0x53/0x80 [ 2362.035444] alloc_vfsmnt+0xb5/0x680 [ 2362.036008] clone_mnt+0x6c/0xce0 [ 2362.036538] copy_tree+0x3b0/0xa60 [ 2362.037091] copy_mnt_ns+0x144/0xa00 [ 2362.037653] ? kmem_cache_alloc+0x2a6/0x310 [ 2362.038318] create_new_namespaces+0xd6/0xb20 [ 2362.039004] copy_namespaces+0x3fb/0x4f0 [ 2362.039621] copy_process+0x385b/0x7800 [ 2362.040222] ? mark_lock+0xf5/0x2df0 [ 2362.040792] ? lock_acquire+0x197/0x470 [ 2362.041407] ? __cleanup_sighand+0xb0/0xb0 [ 2362.042075] ? _copy_from_user+0xfb/0x1b0 [ 2362.042709] kernel_clone+0xe7/0x980 [ 2362.043275] ? lock_acquire+0x197/0x470 [ 2362.043871] ? create_io_thread+0xf0/0xf0 [ 2362.044524] ? ksys_write+0x21a/0x260 [ 2362.045105] ? lock_downgrade+0x6d0/0x6d0 [ 2362.045738] __do_sys_clone3+0x1e5/0x320 [ 2362.046365] ? __do_sys_clone+0x110/0x110 [ 2362.047019] ? rcu_read_lock_any_held+0x75/0xa0 [ 2362.047722] ? vfs_write+0x354/0xa70 [ 2362.048284] ? fput_many+0x2f/0x1a0 [ 2362.048832] ? ksys_write+0x1a9/0x260 [ 2362.049401] ? __ia32_sys_read+0xb0/0xb0 [ 2362.050022] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.050814] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.051584] ? trace_hardirqs_on+0x5b/0x180 [ 2362.052238] do_syscall_64+0x33/0x40 [ 2362.052799] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2362.053568] RIP: 0033:0x7f3d2b989b19 [ 2362.054137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.056862] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2362.058008] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2362.059070] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2362.060132] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.061195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.062264] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2362.143434] FAULT_INJECTION: forcing a failure. [ 2362.143434] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.144602] CPU: 0 PID: 43499 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2362.145250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.146028] Call Trace: [ 2362.146295] dump_stack+0x107/0x167 [ 2362.146648] should_fail.cold+0x5/0xa [ 2362.147022] should_failslab+0x5/0x20 [ 2362.147366] __kmalloc_track_caller+0x79/0x370 [ 2362.147799] ? kstrdup_const+0x53/0x80 [ 2362.148164] kstrdup+0x36/0x70 [ 2362.148468] kstrdup_const+0x53/0x80 [ 2362.148800] alloc_vfsmnt+0xb5/0x680 [ 2362.149136] clone_mnt+0x6c/0xce0 [ 2362.149461] ? copy_tree+0xab/0xa60 [ 2362.149793] ? is_subdir+0x1a8/0x320 [ 2362.150139] copy_tree+0x3b0/0xa60 [ 2362.150481] copy_mnt_ns+0x144/0xa00 [ 2362.150837] ? kmem_cache_alloc+0x2a6/0x310 [ 2362.151234] create_new_namespaces+0xd6/0xb20 [ 2362.151647] copy_namespaces+0x3fb/0x4f0 [ 2362.152018] copy_process+0x385b/0x7800 [ 2362.152377] ? mark_lock+0xf5/0x2df0 [ 2362.152732] ? lock_acquire+0x197/0x470 [ 2362.153123] ? __cleanup_sighand+0xb0/0xb0 [ 2362.153514] ? _copy_from_user+0xfb/0x1b0 [ 2362.154131] kernel_clone+0xe7/0x980 [ 2362.154481] ? lock_acquire+0x197/0x470 [ 2362.154843] ? create_io_thread+0xf0/0xf0 [ 2362.155212] ? ksys_write+0x21a/0x260 [ 2362.155561] ? lock_downgrade+0x6d0/0x6d0 [ 2362.155924] __do_sys_clone3+0x1e5/0x320 [ 2362.156297] ? __do_sys_clone+0x110/0x110 [ 2362.156680] ? rcu_read_lock_any_held+0x75/0xa0 [ 2362.157084] ? vfs_write+0x354/0xa70 [ 2362.157420] ? fput_many+0x2f/0x1a0 [ 2362.157750] ? ksys_write+0x1a9/0x260 [ 2362.158095] ? __ia32_sys_read+0xb0/0xb0 [ 2362.158477] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.158940] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.159401] ? trace_hardirqs_on+0x5b/0x180 [ 2362.159796] do_syscall_64+0x33/0x40 [ 2362.160124] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2362.160584] RIP: 0033:0x7f7f3dd15b19 [ 2362.160918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.162544] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2362.163229] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2362.163869] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2362.164496] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.165125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.165768] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:31:13 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 44) [ 2362.323157] FAULT_INJECTION: forcing a failure. [ 2362.323157] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.325240] CPU: 1 PID: 43516 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2362.326374] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.327720] Call Trace: [ 2362.328158] dump_stack+0x107/0x167 [ 2362.328756] should_fail.cold+0x5/0xa [ 2362.329384] ? create_object.isra.0+0x3a/0xa20 [ 2362.330146] should_failslab+0x5/0x20 [ 2362.330769] kmem_cache_alloc+0x5b/0x310 [ 2362.331438] create_object.isra.0+0x3a/0xa20 [ 2362.332161] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2362.332997] __kmalloc_track_caller+0x177/0x370 [ 2362.333761] ? kstrdup_const+0x53/0x80 [ 2362.334424] kstrdup+0x36/0x70 [ 2362.334958] kstrdup_const+0x53/0x80 [ 2362.335569] alloc_vfsmnt+0xb5/0x680 [ 2362.336191] clone_mnt+0x6c/0xce0 [ 2362.336761] ? is_subdir+0x1a8/0x320 [ 2362.337377] copy_tree+0x3b0/0xa60 [ 2362.337981] copy_mnt_ns+0x144/0xa00 [ 2362.338594] ? kmem_cache_alloc+0x2a6/0x310 [ 2362.339310] create_new_namespaces+0xd6/0xb20 [ 2362.340058] copy_namespaces+0x3fb/0x4f0 [ 2362.340733] copy_process+0x385b/0x7800 [ 2362.341383] ? lock_downgrade+0x6d0/0x6d0 [ 2362.342086] ? lock_acquire+0x197/0x470 [ 2362.342762] ? __cleanup_sighand+0xb0/0xb0 [ 2362.343480] ? _copy_from_user+0xfb/0x1b0 [ 2362.344171] kernel_clone+0xe7/0x980 [ 2362.344787] ? create_io_thread+0xf0/0xf0 [ 2362.345479] ? lock_downgrade+0x6d0/0x6d0 [ 2362.346166] ? enqueue_hrtimer+0x177/0x2e0 [ 2362.346865] __do_sys_clone3+0x1e5/0x320 [ 2362.347524] ? __do_sys_clone+0x110/0x110 [ 2362.348195] ? recalibrate_cpu_khz+0x10/0x10 [ 2362.348925] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.349771] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2362.350642] ? trace_hardirqs_on+0x5b/0x180 [ 2362.351342] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2362.352236] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.353067] ? syscall_enter_from_user_mode+0x27/0x50 [ 2362.353914] do_syscall_64+0x33/0x40 [ 2362.354519] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2362.355351] RIP: 0033:0x7f7f3dd15b19 [ 2362.356089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.359499] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2362.361015] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2362.362241] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2362.363557] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.364987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.366220] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:31:13 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 45) [ 2362.565588] FAULT_INJECTION: forcing a failure. [ 2362.565588] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.566865] CPU: 0 PID: 43520 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2362.567434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.568104] Call Trace: [ 2362.568328] dump_stack+0x107/0x167 [ 2362.568646] should_fail.cold+0x5/0xa [ 2362.568963] ? create_object.isra.0+0x3a/0xa20 [ 2362.569354] should_failslab+0x5/0x20 [ 2362.569768] kmem_cache_alloc+0x5b/0x310 [ 2362.570122] create_object.isra.0+0x3a/0xa20 [ 2362.570497] kmemleak_alloc_percpu+0xa0/0x100 [ 2362.570857] pcpu_alloc+0x4e2/0x1240 [ 2362.571164] alloc_vfsmnt+0xfd/0x680 [ 2362.571472] clone_mnt+0x6c/0xce0 [ 2362.571754] copy_tree+0x3b0/0xa60 [ 2362.572040] copy_mnt_ns+0x144/0xa00 [ 2362.572337] ? kmem_cache_alloc+0x2a6/0x310 [ 2362.572695] create_new_namespaces+0xd6/0xb20 [ 2362.573066] copy_namespaces+0x3fb/0x4f0 [ 2362.573401] copy_process+0x385b/0x7800 [ 2362.573718] ? mark_lock+0xf5/0x2df0 [ 2362.574043] ? lock_acquire+0x197/0x470 [ 2362.574384] ? __cleanup_sighand+0xb0/0xb0 [ 2362.574740] ? _copy_from_user+0xfb/0x1b0 [ 2362.575079] kernel_clone+0xe7/0x980 [ 2362.575383] ? lock_acquire+0x197/0x470 [ 2362.575709] ? create_io_thread+0xf0/0xf0 [ 2362.576046] ? ksys_write+0x21a/0x260 [ 2362.576351] ? lock_downgrade+0x6d0/0x6d0 [ 2362.576699] __do_sys_clone3+0x1e5/0x320 [ 2362.577027] ? __do_sys_clone+0x110/0x110 [ 2362.577382] ? rcu_read_lock_any_held+0x75/0xa0 [ 2362.577756] ? vfs_write+0x354/0xa70 [ 2362.578066] ? fput_many+0x2f/0x1a0 [ 2362.578364] ? ksys_write+0x1a9/0x260 [ 2362.578684] ? __ia32_sys_read+0xb0/0xb0 [ 2362.579013] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.579446] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.579852] ? trace_hardirqs_on+0x5b/0x180 [ 2362.580200] do_syscall_64+0x33/0x40 [ 2362.580503] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2362.580908] RIP: 0033:0x7f3d2b989b19 [ 2362.581205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.582696] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2362.583297] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2362.583941] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2362.584630] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.585320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.586034] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:31:13 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400), 0x0, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:31:13 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 46) [ 2362.760949] FAULT_INJECTION: forcing a failure. [ 2362.760949] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.764310] CPU: 1 PID: 43526 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2362.765402] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.766697] Call Trace: [ 2362.767112] dump_stack+0x107/0x167 [ 2362.767682] should_fail.cold+0x5/0xa [ 2362.768269] ? create_object.isra.0+0x3a/0xa20 [ 2362.768977] ? create_object.isra.0+0x3a/0xa20 [ 2362.769688] should_failslab+0x5/0x20 [ 2362.770289] kmem_cache_alloc+0x5b/0x310 [ 2362.770906] ? mark_held_locks+0x9e/0xe0 [ 2362.771536] create_object.isra.0+0x3a/0xa20 [ 2362.772220] kmemleak_alloc_percpu+0xa0/0x100 [ 2362.772901] pcpu_alloc+0x4e2/0x1240 [ 2362.773496] alloc_vfsmnt+0xfd/0x680 [ 2362.774074] clone_mnt+0x6c/0xce0 [ 2362.774623] copy_tree+0x3b0/0xa60 [ 2362.775184] copy_mnt_ns+0x144/0xa00 [ 2362.775770] ? kmem_cache_alloc+0x2a6/0x310 [ 2362.776442] create_new_namespaces+0xd6/0xb20 [ 2362.777149] copy_namespaces+0x3fb/0x4f0 [ 2362.777785] copy_process+0x385b/0x7800 [ 2362.778402] ? mark_lock+0xf5/0x2df0 [ 2362.778987] ? lock_acquire+0x197/0x470 [ 2362.779618] ? __cleanup_sighand+0xb0/0xb0 [ 2362.780283] ? _copy_from_user+0xfb/0x1b0 [ 2362.780916] kernel_clone+0xe7/0x980 [ 2362.781486] ? lock_acquire+0x197/0x470 [ 2362.782096] ? create_io_thread+0xf0/0xf0 [ 2362.782749] ? ksys_write+0x21a/0x260 [ 2362.783329] ? lock_downgrade+0x6d0/0x6d0 [ 2362.783958] __do_sys_clone3+0x1e5/0x320 [ 2362.784576] ? __do_sys_clone+0x110/0x110 [ 2362.785224] ? rcu_read_lock_any_held+0x75/0xa0 [ 2362.785940] ? vfs_write+0x354/0xa70 [ 2362.786506] ? fput_many+0x2f/0x1a0 [ 2362.787052] ? ksys_write+0x1a9/0x260 [ 2362.787631] ? __ia32_sys_read+0xb0/0xb0 [ 2362.788254] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.789046] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.789822] ? trace_hardirqs_on+0x5b/0x180 [ 2362.790490] do_syscall_64+0x33/0x40 [ 2362.791052] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2362.791829] RIP: 0033:0x7f3d2b989b19 [ 2362.792388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.795127] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2362.796272] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2362.797336] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2362.798406] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.799461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.800526] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2377.904908] FAULT_INJECTION: forcing a failure. [ 2377.904908] name failslab, interval 1, probability 0, space 0, times 0 [ 2377.906018] CPU: 1 PID: 43541 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2377.906879] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2377.907916] Call Trace: [ 2377.908256] dump_stack+0x107/0x167 [ 2377.908722] should_fail.cold+0x5/0xa [ 2377.909213] ? alloc_vfsmnt+0x23/0x680 [ 2377.909713] should_failslab+0x5/0x20 [ 2377.910205] kmem_cache_alloc+0x5b/0x310 [ 2377.910718] ? copy_tree+0x61a/0xa60 [ 2377.911190] alloc_vfsmnt+0x23/0x680 [ 2377.911543] clone_mnt+0x6c/0xce0 [ 2377.911978] copy_tree+0x3b0/0xa60 [ 2377.912425] copy_mnt_ns+0x144/0xa00 [ 2377.912805] ? kmem_cache_alloc+0x2a6/0x310 [ 2377.913363] create_new_namespaces+0xd6/0xb20 [ 2377.913928] copy_namespaces+0x3fb/0x4f0 [ 2377.914446] copy_process+0x385b/0x7800 [ 2377.914942] ? mark_lock+0xf5/0x2df0 [ 2377.915416] ? lock_acquire+0x197/0x470 [ 2377.915923] ? __cleanup_sighand+0xb0/0xb0 [ 2377.916464] ? _copy_from_user+0xfb/0x1b0 [ 2377.916987] kernel_clone+0xe7/0x980 [ 2377.917451] ? lock_acquire+0x197/0x470 [ 2377.917821] ? create_io_thread+0xf0/0xf0 [ 2377.918360] ? ksys_write+0x21a/0x260 [ 2377.918836] ? lock_downgrade+0x6d0/0x6d0 [ 2377.919358] __do_sys_clone3+0x1e5/0x320 [ 2377.919860] ? __do_sys_clone+0x110/0x110 [ 2377.920392] ? rcu_read_lock_any_held+0x75/0xa0 [ 2377.920969] ? vfs_write+0x354/0xa70 [ 2377.921435] ? fput_many+0x2f/0x1a0 [ 2377.921891] ? ksys_write+0x1a9/0x260 [ 2377.922379] ? __ia32_sys_read+0xb0/0xb0 [ 2377.922884] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2377.923533] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2377.924042] ? trace_hardirqs_on+0x5b/0x180 [ 2377.924590] do_syscall_64+0x33/0x40 [ 2377.925058] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2377.925693] RIP: 0033:0x7f3d2b989b19 [ 2377.926169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2377.928423] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2377.929363] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2377.930253] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2377.931132] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2377.932008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2377.932888] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2377.942260] FAULT_INJECTION: forcing a failure. [ 2377.942260] name failslab, interval 1, probability 0, space 0, times 0 [ 2377.943469] CPU: 1 PID: 43535 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2377.944305] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2377.945291] Call Trace: [ 2377.945613] dump_stack+0x107/0x167 [ 2377.946056] should_fail.cold+0x5/0xa [ 2377.946538] ? create_object.isra.0+0x3a/0xa20 [ 2377.946971] should_failslab+0x5/0x20 [ 2377.947332] kmem_cache_alloc+0x5b/0x310 [ 2377.947716] create_object.isra.0+0x3a/0xa20 [ 2377.948129] kmemleak_alloc_percpu+0xa0/0x100 [ 2377.948551] pcpu_alloc+0x4e2/0x1240 [ 2377.948914] alloc_vfsmnt+0xfd/0x680 [ 2377.949268] clone_mnt+0x6c/0xce0 [ 2377.949592] ? is_subdir+0x1a8/0x320 [ 2377.949942] copy_tree+0x3b0/0xa60 [ 2377.950300] copy_mnt_ns+0x144/0xa00 [ 2377.950662] ? kmem_cache_alloc+0x2a6/0x310 [ 2377.951069] create_new_namespaces+0xd6/0xb20 [ 2377.951499] copy_namespaces+0x3fb/0x4f0 [ 2377.951881] copy_process+0x385b/0x7800 [ 2377.952496] ? mark_lock+0xf5/0x2df0 [ 2377.952877] ? lock_acquire+0x197/0x470 [ 2377.953348] ? __cleanup_sighand+0xb0/0xb0 [ 2377.953788] ? _copy_from_user+0xfb/0x1b0 [ 2377.954268] kernel_clone+0xe7/0x980 08:31:28 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 45) 08:31:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:31:28 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b", 0xa, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:31:28 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 47) 08:31:28 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c", 0x13, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:31:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:31:28 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0xa4, 0x4, 0x80, 0x0, 0xdf, 0x39624, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x6f5, 0xae8}, 0x42000, 0x8, 0x4, 0x5, 0x1, 0x4, 0xd8a, 0x0, 0x20, 0x0, 0xe1}, r1, 0xf, 0xffffffffffffffff, 0xb) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:31:28 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) [ 2377.954654] ? lock_acquire+0x197/0x470 [ 2377.955181] ? create_io_thread+0xf0/0xf0 r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c", 0x13, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2377.955591] ? ksys_write+0x21a/0x260 [ 2377.956079] ? lock_downgrade+0x6d0/0x6d0 [ 2377.956587] __do_sys_clone3+0x1e5/0x320 [ 2377.957105] ? __do_sys_clone+0x110/0x110 [ 2377.957645] ? rcu_read_lock_any_held+0x75/0xa0 [ 2377.958242] ? vfs_write+0x354/0xa70 [ 2377.958713] ? fput_many+0x2f/0x1a0 [ 2377.959155] ? ksys_write+0x1a9/0x260 [ 2377.959615] ? __ia32_sys_read+0xb0/0xb0 [ 2377.960004] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2377.960633] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2377.961260] ? trace_hardirqs_on+0x5b/0x180 [ 2377.961682] do_syscall_64+0x33/0x40 [ 2377.962036] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2377.962524] RIP: 0033:0x7f7f3dd15b19 [ 2377.962879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2377.964574] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2377.965275] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2377.965927] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2377.966596] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2377.967244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2377.967895] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:31:29 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 48) 08:31:29 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 46) [ 2378.068938] FAULT_INJECTION: forcing a failure. [ 2378.068938] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.069864] CPU: 0 PID: 43565 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2378.070409] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.071055] Call Trace: [ 2378.071269] dump_stack+0x107/0x167 [ 2378.071556] should_fail.cold+0x5/0xa [ 2378.071858] ? create_object.isra.0+0x3a/0xa20 [ 2378.072222] should_failslab+0x5/0x20 [ 2378.072523] kmem_cache_alloc+0x5b/0x310 [ 2378.072853] create_object.isra.0+0x3a/0xa20 [ 2378.073223] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2378.073776] kmem_cache_alloc+0x159/0x310 [ 2378.074115] alloc_vfsmnt+0x23/0x680 [ 2378.074409] clone_mnt+0x6c/0xce0 [ 2378.074689] copy_tree+0x3b0/0xa60 [ 2378.074982] copy_mnt_ns+0x144/0xa00 [ 2378.075278] ? kmem_cache_alloc+0x2a6/0x310 [ 2378.075622] create_new_namespaces+0xd6/0xb20 [ 2378.075969] copy_namespaces+0x3fb/0x4f0 [ 2378.076292] copy_process+0x385b/0x7800 [ 2378.076610] ? mark_lock+0xf5/0x2df0 [ 2378.076894] ? lock_acquire+0x197/0x470 [ 2378.077217] ? __cleanup_sighand+0xb0/0xb0 [ 2378.077565] ? _copy_from_user+0xfb/0x1b0 [ 2378.077883] kernel_clone+0xe7/0x980 [ 2378.078182] ? lock_acquire+0x197/0x470 [ 2378.078493] ? create_io_thread+0xf0/0xf0 [ 2378.078829] ? ksys_write+0x21a/0x260 [ 2378.079129] ? lock_downgrade+0x6d0/0x6d0 [ 2378.079458] __do_sys_clone3+0x1e5/0x320 [ 2378.079779] ? __do_sys_clone+0x110/0x110 [ 2378.080117] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.080477] ? vfs_write+0x354/0xa70 [ 2378.080772] ? fput_many+0x2f/0x1a0 [ 2378.081058] ? ksys_write+0x1a9/0x260 [ 2378.081359] ? __ia32_sys_read+0xb0/0xb0 [ 2378.081679] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.082079] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.082482] ? trace_hardirqs_on+0x5b/0x180 [ 2378.082825] do_syscall_64+0x33/0x40 [ 2378.083108] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2378.083491] RIP: 0033:0x7f3d2b989b19 [ 2378.083789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.085208] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2378.085803] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2378.086365] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2378.086924] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.087480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.088036] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2378.126681] FAULT_INJECTION: forcing a failure. [ 2378.126681] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.127987] CPU: 1 PID: 43567 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2378.128583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.129300] Call Trace: [ 2378.129542] dump_stack+0x107/0x167 [ 2378.129861] should_fail.cold+0x5/0xa [ 2378.130209] ? create_object.isra.0+0x3a/0xa20 [ 2378.130607] should_failslab+0x5/0x20 [ 2378.130938] kmem_cache_alloc+0x5b/0x310 [ 2378.131293] ? mark_held_locks+0x9e/0xe0 [ 2378.131646] create_object.isra.0+0x3a/0xa20 [ 2378.132043] kmemleak_alloc_percpu+0xa0/0x100 [ 2378.132439] pcpu_alloc+0x4e2/0x1240 [ 2378.132779] alloc_vfsmnt+0xfd/0x680 [ 2378.133102] clone_mnt+0x6c/0xce0 [ 2378.133406] ? is_subdir+0x1a8/0x320 [ 2378.133733] copy_tree+0x3b0/0xa60 [ 2378.134051] copy_mnt_ns+0x144/0xa00 [ 2378.134389] ? kmem_cache_alloc+0x2a6/0x310 [ 2378.134769] create_new_namespaces+0xd6/0xb20 [ 2378.135180] copy_namespaces+0x3fb/0x4f0 [ 2378.135544] copy_process+0x385b/0x7800 [ 2378.135895] ? mark_lock+0xf5/0x2df0 [ 2378.136224] ? lock_acquire+0x197/0x470 [ 2378.136581] ? __cleanup_sighand+0xb0/0xb0 08:31:29 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 49) [ 2378.136958] ? _copy_from_user+0xfb/0x1b0 [ 2378.137472] kernel_clone+0xe7/0x980 [ 2378.137891] ? lock_acquire+0x197/0x470 [ 2378.138251] ? create_io_thread+0xf0/0xf0 [ 2378.138730] ? ksys_write+0x21a/0x260 [ 2378.139160] ? lock_downgrade+0x6d0/0x6d0 [ 2378.139528] __do_sys_clone3+0x1e5/0x320 [ 2378.139994] ? __do_sys_clone+0x110/0x110 [ 2378.140377] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.140907] ? vfs_write+0x354/0xa70 [ 2378.141231] ? fput_many+0x2f/0x1a0 [ 2378.141558] ? ksys_write+0x1a9/0x260 [ 2378.141998] ? __ia32_sys_read+0xb0/0xb0 [ 2378.142366] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.142965] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.143548] ? trace_hardirqs_on+0x5b/0x180 [ 2378.143968] do_syscall_64+0x33/0x40 [ 2378.144392] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2378.144818] RIP: 0033:0x7f7f3dd15b19 [ 2378.145234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.146773] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2378.147631] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2378.148417] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2378.149219] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.150021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.150839] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2378.182101] FAULT_INJECTION: forcing a failure. [ 2378.182101] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.183087] CPU: 0 PID: 43573 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2378.183643] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.184311] Call Trace: [ 2378.184544] dump_stack+0x107/0x167 [ 2378.184843] should_fail.cold+0x5/0xa [ 2378.185161] should_failslab+0x5/0x20 [ 2378.185480] __kmalloc_track_caller+0x79/0x370 [ 2378.185845] ? kstrdup_const+0x53/0x80 [ 2378.186179] kstrdup+0x36/0x70 [ 2378.186449] kstrdup_const+0x53/0x80 [ 2378.186748] alloc_vfsmnt+0xb5/0x680 [ 2378.187045] clone_mnt+0x6c/0xce0 [ 2378.187333] copy_tree+0x3b0/0xa60 [ 2378.187629] copy_mnt_ns+0x144/0xa00 [ 2378.187934] ? kmem_cache_alloc+0x2a6/0x310 [ 2378.188280] create_new_namespaces+0xd6/0xb20 [ 2378.188662] copy_namespaces+0x3fb/0x4f0 [ 2378.188986] copy_process+0x385b/0x7800 [ 2378.189313] ? mark_lock+0xf5/0x2df0 [ 2378.189622] ? lock_acquire+0x197/0x470 [ 2378.189956] ? __cleanup_sighand+0xb0/0xb0 [ 2378.190312] ? _copy_from_user+0xfb/0x1b0 [ 2378.190661] kernel_clone+0xe7/0x980 [ 2378.190969] ? lock_acquire+0x197/0x470 [ 2378.191283] ? create_io_thread+0xf0/0xf0 [ 2378.191638] ? ksys_write+0x21a/0x260 [ 2378.191945] ? lock_downgrade+0x6d0/0x6d0 [ 2378.192276] __do_sys_clone3+0x1e5/0x320 [ 2378.192605] ? __do_sys_clone+0x110/0x110 [ 2378.192947] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.193309] ? vfs_write+0x354/0xa70 [ 2378.193621] ? fput_many+0x2f/0x1a0 [ 2378.193915] ? ksys_write+0x1a9/0x260 [ 2378.194230] ? __ia32_sys_read+0xb0/0xb0 [ 2378.194559] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.194972] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.195400] ? trace_hardirqs_on+0x5b/0x180 [ 2378.195748] do_syscall_64+0x33/0x40 [ 2378.196048] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2378.196462] RIP: 0033:0x7f3d2b989b19 [ 2378.196759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.198206] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2378.198813] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2378.199387] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2378.199950] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.200517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.201081] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:31:29 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 47) [ 2378.291424] FAULT_INJECTION: forcing a failure. [ 2378.291424] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.292430] CPU: 0 PID: 43575 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2378.292981] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.293646] Call Trace: [ 2378.293866] dump_stack+0x107/0x167 [ 2378.294162] should_fail.cold+0x5/0xa [ 2378.294476] ? create_object.isra.0+0x3a/0xa20 [ 2378.294811] should_failslab+0x5/0x20 [ 2378.295111] kmem_cache_alloc+0x5b/0x310 [ 2378.295440] ? mark_held_locks+0x9e/0xe0 [ 2378.295761] create_object.isra.0+0x3a/0xa20 08:31:29 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 50) [ 2378.296122] kmemleak_alloc_percpu+0xa0/0x100 [ 2378.296623] pcpu_alloc+0x4e2/0x1240 [ 2378.296932] alloc_vfsmnt+0xfd/0x680 [ 2378.297225] clone_mnt+0x6c/0xce0 [ 2378.297504] ? is_subdir+0x1a8/0x320 [ 2378.297810] copy_tree+0x3b0/0xa60 [ 2378.298120] copy_mnt_ns+0x144/0xa00 [ 2378.298414] ? kmem_cache_alloc+0x2a6/0x310 [ 2378.298756] create_new_namespaces+0xd6/0xb20 [ 2378.299117] copy_namespaces+0x3fb/0x4f0 [ 2378.299446] copy_process+0x385b/0x7800 [ 2378.299758] ? mark_lock+0xf5/0x2df0 [ 2378.300053] ? lock_acquire+0x197/0x470 [ 2378.300383] ? __cleanup_sighand+0xb0/0xb0 [ 2378.300727] ? _copy_from_user+0xfb/0x1b0 [ 2378.301061] kernel_clone+0xe7/0x980 [ 2378.301352] ? lock_acquire+0x197/0x470 [ 2378.301669] ? create_io_thread+0xf0/0xf0 [ 2378.302013] ? ksys_write+0x21a/0x260 [ 2378.302318] ? lock_downgrade+0x6d0/0x6d0 [ 2378.302654] __do_sys_clone3+0x1e5/0x320 [ 2378.302972] ? __do_sys_clone+0x110/0x110 [ 2378.303315] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.303674] ? vfs_write+0x354/0xa70 [ 2378.303967] ? fput_many+0x2f/0x1a0 [ 2378.304252] ? ksys_write+0x1a9/0x260 [ 2378.304549] ? __ia32_sys_read+0xb0/0xb0 [ 2378.304868] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.305284] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.305684] ? trace_hardirqs_on+0x5b/0x180 [ 2378.306027] do_syscall_64+0x33/0x40 [ 2378.306329] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2378.306728] RIP: 0033:0x7f7f3dd15b19 [ 2378.307021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.308438] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2378.309031] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2378.309583] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2378.310136] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.310685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.311234] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2378.318825] FAULT_INJECTION: forcing a failure. [ 2378.318825] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.319827] CPU: 1 PID: 43577 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2378.320550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.321413] Call Trace: [ 2378.321697] dump_stack+0x107/0x167 [ 2378.322100] should_fail.cold+0x5/0xa [ 2378.322499] ? create_object.isra.0+0x3a/0xa20 [ 2378.322972] should_failslab+0x5/0x20 [ 2378.323363] kmem_cache_alloc+0x5b/0x310 [ 2378.323714] create_object.isra.0+0x3a/0xa20 [ 2378.324179] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2378.324567] __kmalloc_track_caller+0x177/0x370 [ 2378.325049] ? kstrdup_const+0x53/0x80 [ 2378.325379] kstrdup+0x36/0x70 [ 2378.325710] kstrdup_const+0x53/0x80 [ 2378.326007] alloc_vfsmnt+0xb5/0x680 [ 2378.326401] clone_mnt+0x6c/0xce0 [ 2378.326764] copy_tree+0x3b0/0xa60 [ 2378.327083] copy_mnt_ns+0x144/0xa00 [ 2378.327471] ? kmem_cache_alloc+0x2a6/0x310 [ 2378.327837] create_new_namespaces+0xd6/0xb20 [ 2378.328299] copy_namespaces+0x3fb/0x4f0 [ 2378.328645] copy_process+0x385b/0x7800 [ 2378.329062] ? mark_lock+0xf5/0x2df0 [ 2378.329456] ? lock_acquire+0x197/0x470 [ 2378.329776] ? __cleanup_sighand+0xb0/0xb0 [ 2378.330233] ? _copy_from_user+0xfb/0x1b0 [ 2378.330666] kernel_clone+0xe7/0x980 [ 2378.330982] ? lock_acquire+0x197/0x470 [ 2378.331384] ? create_io_thread+0xf0/0xf0 [ 2378.331823] ? ksys_write+0x21a/0x260 [ 2378.332147] ? lock_downgrade+0x6d0/0x6d0 [ 2378.332587] __do_sys_clone3+0x1e5/0x320 [ 2378.333015] ? __do_sys_clone+0x110/0x110 [ 2378.333460] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.333949] ? vfs_write+0x354/0xa70 [ 2378.334243] ? fput_many+0x2f/0x1a0 [ 2378.334614] ? ksys_write+0x1a9/0x260 [ 2378.335013] ? __ia32_sys_read+0xb0/0xb0 [ 2378.335327] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.335873] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.336299] ? trace_hardirqs_on+0x5b/0x180 [ 2378.336740] do_syscall_64+0x33/0x40 [ 2378.337023] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2378.337548] RIP: 0033:0x7f3d2b989b19 [ 2378.337832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.339703] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2378.340470] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2378.341191] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2378.341913] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.342638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.343363] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:31:29 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 48) 08:31:29 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2378.646527] FAULT_INJECTION: forcing a failure. [ 2378.646527] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.648572] CPU: 0 PID: 43580 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2378.649670] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.650990] Call Trace: [ 2378.651420] dump_stack+0x107/0x167 [ 2378.652010] should_fail.cold+0x5/0xa [ 2378.652623] ? create_object.isra.0+0x3a/0xa20 [ 2378.653355] should_failslab+0x5/0x20 [ 2378.653964] kmem_cache_alloc+0x5b/0x310 [ 2378.654616] ? find_held_lock+0x2c/0x110 [ 2378.655274] create_object.isra.0+0x3a/0xa20 [ 2378.655983] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2378.656809] kmem_cache_alloc+0x159/0x310 [ 2378.657479] alloc_vfsmnt+0x23/0x680 [ 2378.658088] clone_mnt+0x6c/0xce0 [ 2378.658652] copy_tree+0x3b0/0xa60 [ 2378.659233] copy_mnt_ns+0x144/0xa00 [ 2378.659831] ? kmem_cache_alloc+0x2a6/0x310 [ 2378.660522] create_new_namespaces+0xd6/0xb20 [ 2378.661244] copy_namespaces+0x3fb/0x4f0 [ 2378.661895] copy_process+0x385b/0x7800 [ 2378.662538] ? mark_lock+0xf5/0x2df0 [ 2378.663138] ? lock_acquire+0x197/0x470 [ 2378.663787] ? __cleanup_sighand+0xb0/0xb0 [ 2378.664477] ? _copy_from_user+0xfb/0x1b0 [ 2378.665145] kernel_clone+0xe7/0x980 [ 2378.665736] ? lock_acquire+0x197/0x470 [ 2378.666382] ? create_io_thread+0xf0/0xf0 [ 2378.667055] ? ksys_write+0x21a/0x260 [ 2378.667670] ? lock_downgrade+0x6d0/0x6d0 [ 2378.668334] __do_sys_clone3+0x1e5/0x320 [ 2378.668984] ? __do_sys_clone+0x110/0x110 [ 2378.669661] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.670409] ? vfs_write+0x354/0xa70 [ 2378.671003] ? fput_many+0x2f/0x1a0 [ 2378.671584] ? ksys_write+0x1a9/0x260 [ 2378.672190] ? __ia32_sys_read+0xb0/0xb0 [ 2378.672843] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.673672] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.674496] ? trace_hardirqs_on+0x5b/0x180 [ 2378.675188] do_syscall_64+0x33/0x40 [ 2378.675782] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2378.676595] RIP: 0033:0x7f7f3dd15b19 [ 2378.677189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.680094] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2378.681302] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2378.682437] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2378.683569] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.684697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.685830] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:31:44 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 51) 08:31:44 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:31:44 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b", 0xa, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:31:44 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 49) 08:31:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2393.498346] FAULT_INJECTION: forcing a failure. [ 2393.498346] name failslab, interval 1, probability 0, space 0, times 0 [ 2393.500341] CPU: 0 PID: 43601 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2393.501463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2393.503008] Call Trace: [ 2393.503442] dump_stack+0x107/0x167 [ 2393.504031] should_fail.cold+0x5/0xa [ 2393.504652] should_failslab+0x5/0x20 [ 2393.505271] __kmalloc_track_caller+0x79/0x370 [ 2393.506009] ? kstrdup_const+0x53/0x80 [ 2393.506648] kstrdup+0x36/0x70 [ 2393.507172] kstrdup_const+0x53/0x80 [ 2393.507775] alloc_vfsmnt+0xb5/0x680 [ 2393.508366] clone_mnt+0x6c/0xce0 [ 2393.508932] copy_tree+0x3b0/0xa60 [ 2393.509517] copy_mnt_ns+0x144/0xa00 [ 2393.510121] ? kmem_cache_alloc+0x2a6/0x310 [ 2393.510830] create_new_namespaces+0xd6/0xb20 [ 2393.511561] copy_namespaces+0x3fb/0x4f0 [ 2393.512221] copy_process+0x385b/0x7800 [ 2393.512863] ? mark_lock+0xf5/0x2df0 [ 2393.513513] ? lock_acquire+0x197/0x470 [ 2393.514185] ? __cleanup_sighand+0xb0/0xb0 [ 2393.514901] ? _copy_from_user+0xfb/0x1b0 [ 2393.515581] kernel_clone+0xe7/0x980 [ 2393.516183] ? lock_acquire+0x197/0x470 [ 2393.516824] ? create_io_thread+0xf0/0xf0 [ 2393.517509] ? ksys_write+0x21a/0x260 [ 2393.518127] ? lock_downgrade+0x6d0/0x6d0 [ 2393.518812] __do_sys_clone3+0x1e5/0x320 [ 2393.519466] ? __do_sys_clone+0x110/0x110 [ 2393.520152] ? rcu_read_lock_any_held+0x75/0xa0 [ 2393.520899] ? vfs_write+0x354/0xa70 [ 2393.521499] ? fput_many+0x2f/0x1a0 [ 2393.522089] ? ksys_write+0x1a9/0x260 [ 2393.522710] ? __ia32_sys_read+0xb0/0xb0 [ 2393.523367] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2393.524205] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2393.525026] ? trace_hardirqs_on+0x5b/0x180 [ 2393.525725] do_syscall_64+0x33/0x40 [ 2393.526331] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2393.527159] RIP: 0033:0x7f7f3dd15b19 [ 2393.527759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2393.530703] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2393.531932] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2393.533076] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2393.534227] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2393.535372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2393.536517] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:31:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:31:44 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) perf_event_open(&(0x7f00000001c0)={0x7, 0x80, 0xf1, 0x47, 0x81, 0x7, 0x0, 0x3, 0x20, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x112, 0x3, 0x4, 0x5, 0x2, 0x7, 0x1, 0x0, 0x8, 0x0, 0x7}, r1, 0xe, r0, 0x2) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r3 = getpgrp(0x0) tgkill(r3, r3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x48, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x7, 0x3, 0x7, 0x4, 0x0, 0x20}, r3, 0x9, r4, 0x3) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r2, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:31:44 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c", 0x13, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2393.538564] FAULT_INJECTION: forcing a failure. [ 2393.538564] name failslab, interval 1, probability 0, space 0, times 0 [ 2393.540860] CPU: 1 PID: 43606 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2393.542015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2393.543355] Call Trace: [ 2393.543794] dump_stack+0x107/0x167 [ 2393.544388] should_fail.cold+0x5/0xa [ 2393.545010] ? create_object.isra.0+0x3a/0xa20 [ 2393.545746] should_failslab+0x5/0x20 [ 2393.546372] kmem_cache_alloc+0x5b/0x310 [ 2393.547034] create_object.isra.0+0x3a/0xa20 [ 2393.547740] kmemleak_alloc_percpu+0xa0/0x100 [ 2393.548471] pcpu_alloc+0x4e2/0x1240 [ 2393.549086] alloc_vfsmnt+0xfd/0x680 [ 2393.549696] clone_mnt+0x6c/0xce0 [ 2393.550282] copy_tree+0x3b0/0xa60 [ 2393.550873] copy_mnt_ns+0x144/0xa00 [ 2393.551478] ? kmem_cache_alloc+0x2a6/0x310 [ 2393.552183] create_new_namespaces+0xd6/0xb20 [ 2393.552911] copy_namespaces+0x3fb/0x4f0 [ 2393.553571] copy_process+0x385b/0x7800 [ 2393.554217] ? mark_lock+0xf5/0x2df0 [ 2393.554845] ? lock_acquire+0x197/0x470 [ 2393.555498] ? __cleanup_sighand+0xb0/0xb0 [ 2393.556185] ? _copy_from_user+0xfb/0x1b0 [ 2393.556865] kernel_clone+0xe7/0x980 [ 2393.557473] ? lock_acquire+0x197/0x470 [ 2393.558109] ? create_io_thread+0xf0/0xf0 [ 2393.558803] ? ksys_write+0x21a/0x260 [ 2393.559419] ? lock_downgrade+0x6d0/0x6d0 [ 2393.560090] __do_sys_clone3+0x1e5/0x320 [ 2393.560757] ? __do_sys_clone+0x110/0x110 [ 2393.561449] ? rcu_read_lock_any_held+0x75/0xa0 [ 2393.562192] ? vfs_write+0x354/0xa70 [ 2393.562810] ? fput_many+0x2f/0x1a0 [ 2393.563398] ? ksys_write+0x1a9/0x260 [ 2393.564016] ? __ia32_sys_read+0xb0/0xb0 [ 2393.564677] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2393.565518] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2393.566351] ? trace_hardirqs_on+0x5b/0x180 [ 2393.567054] do_syscall_64+0x33/0x40 [ 2393.567658] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2393.568480] RIP: 0033:0x7f3d2b989b19 [ 2393.569070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2393.571959] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2393.573180] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2393.574324] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2393.575453] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2393.576579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2393.577704] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:31:44 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 50) 08:31:44 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 52) [ 2393.825401] FAULT_INJECTION: forcing a failure. [ 2393.825401] name failslab, interval 1, probability 0, space 0, times 0 [ 2393.828180] CPU: 1 PID: 43627 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2393.829548] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2393.831197] Call Trace: [ 2393.831722] dump_stack+0x107/0x167 [ 2393.832438] should_fail.cold+0x5/0xa [ 2393.833191] ? create_object.isra.0+0x3a/0xa20 [ 2393.834094] should_failslab+0x5/0x20 [ 2393.834867] kmem_cache_alloc+0x5b/0x310 [ 2393.835687] create_object.isra.0+0x3a/0xa20 [ 2393.836554] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2393.837337] __kmalloc_track_caller+0x177/0x370 [ 2393.838236] ? kstrdup_const+0x53/0x80 [ 2393.838906] kstrdup+0x36/0x70 [ 2393.839524] kstrdup_const+0x53/0x80 [ 2393.840098] alloc_vfsmnt+0xb5/0x680 [ 2393.840844] clone_mnt+0x6c/0xce0 [ 2393.841387] copy_tree+0x3b0/0xa60 [ 2393.842095] copy_mnt_ns+0x144/0xa00 [ 2393.842725] ? kmem_cache_alloc+0x2a6/0x310 [ 2393.843567] create_new_namespaces+0xd6/0xb20 [ 2393.844265] copy_namespaces+0x3fb/0x4f0 [ 2393.845063] copy_process+0x385b/0x7800 [ 2393.845679] ? mark_lock+0xf5/0x2df0 [ 2393.846447] ? lock_acquire+0x197/0x470 [ 2393.847075] ? __cleanup_sighand+0xb0/0xb0 [ 2393.847926] ? _copy_from_user+0xfb/0x1b0 [ 2393.848599] kernel_clone+0xe7/0x980 [ 2393.849356] ? lock_acquire+0x197/0x470 [ 2393.849972] ? create_io_thread+0xf0/0xf0 [ 2393.850812] ? ksys_write+0x21a/0x260 [ 2393.851400] ? lock_downgrade+0x6d0/0x6d0 [ 2393.852241] __do_sys_clone3+0x1e5/0x320 [ 2393.853043] ? __do_sys_clone+0x110/0x110 [ 2393.853888] ? rcu_read_lock_any_held+0x75/0xa0 [ 2393.854811] ? vfs_write+0x354/0xa70 [ 2393.855550] ? fput_many+0x2f/0x1a0 [ 2393.856116] ? ksys_write+0x1a9/0x260 [ 2393.856863] ? __ia32_sys_read+0xb0/0xb0 [ 2393.857494] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2393.858551] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2393.859565] ? trace_hardirqs_on+0x5b/0x180 [ 2393.860233] do_syscall_64+0x33/0x40 [ 2393.860965] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2393.861979] RIP: 0033:0x7f7f3dd15b19 [ 2393.862582] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2393.866225] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2393.867748] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2393.869158] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2393.870563] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2393.871967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2393.873350] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2393.912458] FAULT_INJECTION: forcing a failure. [ 2393.912458] name failslab, interval 1, probability 0, space 0, times 0 [ 2393.914043] CPU: 0 PID: 43629 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2393.915011] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2393.916109] Call Trace: [ 2393.916485] dump_stack+0x107/0x167 [ 2393.917006] should_fail.cold+0x5/0xa [ 2393.917543] ? create_object.isra.0+0x3a/0xa20 [ 2393.918213] should_failslab+0x5/0x20 [ 2393.918765] kmem_cache_alloc+0x5b/0x310 [ 2393.919343] create_object.isra.0+0x3a/0xa20 [ 2393.919983] kmemleak_alloc_percpu+0xa0/0x100 [ 2393.920620] pcpu_alloc+0x4e2/0x1240 [ 2393.921164] alloc_vfsmnt+0xfd/0x680 [ 2393.921679] clone_mnt+0x6c/0xce0 [ 2393.922199] copy_tree+0x3b0/0xa60 [ 2393.922710] copy_mnt_ns+0x144/0xa00 [ 2393.923242] ? kmem_cache_alloc+0x2a6/0x310 [ 2393.923847] create_new_namespaces+0xd6/0xb20 [ 2393.924491] copy_namespaces+0x3fb/0x4f0 [ 2393.925054] copy_process+0x385b/0x7800 [ 2393.925620] ? mark_lock+0xf5/0x2df0 [ 2393.926139] ? lock_acquire+0x197/0x470 [ 2393.926742] ? __cleanup_sighand+0xb0/0xb0 [ 2393.927357] ? _copy_from_user+0xfb/0x1b0 [ 2393.927944] kernel_clone+0xe7/0x980 [ 2393.928483] ? lock_acquire+0x197/0x470 [ 2393.929045] ? create_io_thread+0xf0/0xf0 [ 2393.929642] ? ksys_write+0x21a/0x260 [ 2393.930193] ? lock_downgrade+0x6d0/0x6d0 [ 2393.930787] __do_sys_clone3+0x1e5/0x320 [ 2393.931358] ? __do_sys_clone+0x110/0x110 [ 2393.931958] ? rcu_read_lock_any_held+0x75/0xa0 [ 2393.932617] ? vfs_write+0x354/0xa70 [ 2393.933142] ? fput_many+0x2f/0x1a0 [ 2393.933663] ? ksys_write+0x1a9/0x260 [ 2393.934210] ? __ia32_sys_read+0xb0/0xb0 [ 2393.934800] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2393.935554] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2393.936276] ? trace_hardirqs_on+0x5b/0x180 [ 2393.936903] do_syscall_64+0x33/0x40 [ 2393.937429] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2393.938151] RIP: 0033:0x7f3d2b989b19 [ 2393.938664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2393.941255] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2393.942294] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2393.943322] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2393.944325] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2393.945334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2393.946364] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:31:45 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 53) 08:31:45 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r3, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000180)={r2, 0x6, 0x8, 0x80000001}) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:31:45 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2394.409274] FAULT_INJECTION: forcing a failure. [ 2394.409274] name failslab, interval 1, probability 0, space 0, times 0 [ 2394.411133] CPU: 1 PID: 43636 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2394.412225] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2394.413530] Call Trace: [ 2394.413957] dump_stack+0x107/0x167 [ 2394.414545] should_fail.cold+0x5/0xa [ 2394.415153] ? alloc_vfsmnt+0x23/0x680 [ 2394.415773] should_failslab+0x5/0x20 [ 2394.416381] kmem_cache_alloc+0x5b/0x310 [ 2394.417026] ? copy_tree+0x61a/0xa60 [ 2394.417625] alloc_vfsmnt+0x23/0x680 [ 2394.418223] clone_mnt+0x6c/0xce0 [ 2394.418793] copy_tree+0x3b0/0xa60 [ 2394.419377] copy_mnt_ns+0x144/0xa00 [ 2394.419972] ? kmem_cache_alloc+0x2a6/0x310 [ 2394.420663] create_new_namespaces+0xd6/0xb20 [ 2394.421382] copy_namespaces+0x3fb/0x4f0 [ 2394.422032] copy_process+0x385b/0x7800 [ 2394.422676] ? mark_lock+0xf5/0x2df0 [ 2394.423275] ? lock_acquire+0x197/0x470 [ 2394.423927] ? __cleanup_sighand+0xb0/0xb0 [ 2394.424613] ? _copy_from_user+0xfb/0x1b0 [ 2394.425279] kernel_clone+0xe7/0x980 [ 2394.425874] ? lock_acquire+0x197/0x470 [ 2394.426516] ? create_io_thread+0xf0/0xf0 [ 2394.427189] ? ksys_write+0x21a/0x260 [ 2394.427797] ? lock_downgrade+0x6d0/0x6d0 [ 2394.428460] __do_sys_clone3+0x1e5/0x320 [ 2394.429103] ? __do_sys_clone+0x110/0x110 [ 2394.429781] ? rcu_read_lock_any_held+0x75/0xa0 [ 2394.430525] ? vfs_write+0x354/0xa70 [ 2394.431116] ? fput_many+0x2f/0x1a0 [ 2394.431699] ? ksys_write+0x1a9/0x260 [ 2394.432306] ? __ia32_sys_read+0xb0/0xb0 [ 2394.432954] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2394.433779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2394.434574] ? trace_hardirqs_on+0x5b/0x180 [ 2394.435241] do_syscall_64+0x33/0x40 [ 2394.435813] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2394.436598] RIP: 0033:0x7f3d2b989b19 [ 2394.437171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2394.439976] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2394.441121] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2394.442208] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2394.443308] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2394.444396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2394.445483] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:31:45 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 51) 08:31:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:31:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:31:45 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 54) 08:31:45 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b", 0xa, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2394.532345] FAULT_INJECTION: forcing a failure. [ 2394.532345] name failslab, interval 1, probability 0, space 0, times 0 [ 2394.533315] CPU: 0 PID: 43644 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2394.533876] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2394.534543] Call Trace: [ 2394.534762] dump_stack+0x107/0x167 [ 2394.535050] should_fail.cold+0x5/0xa [ 2394.535356] ? create_object.isra.0+0x3a/0xa20 [ 2394.535717] should_failslab+0x5/0x20 [ 2394.536023] kmem_cache_alloc+0x5b/0x310 [ 2394.536348] create_object.isra.0+0x3a/0xa20 [ 2394.536699] kmemleak_alloc_percpu+0xa0/0x100 [ 2394.537056] pcpu_alloc+0x4e2/0x1240 [ 2394.537361] alloc_vfsmnt+0xfd/0x680 [ 2394.537660] clone_mnt+0x6c/0xce0 [ 2394.537943] copy_tree+0x3b0/0xa60 [ 2394.538231] copy_mnt_ns+0x144/0xa00 [ 2394.538535] ? kmem_cache_alloc+0x2a6/0x310 [ 2394.538883] create_new_namespaces+0xd6/0xb20 [ 2394.539241] copy_namespaces+0x3fb/0x4f0 [ 2394.539567] copy_process+0x385b/0x7800 [ 2394.539886] ? mark_lock+0xf5/0x2df0 [ 2394.540200] ? lock_acquire+0x197/0x470 [ 2394.540544] ? __cleanup_sighand+0xb0/0xb0 [ 2394.540900] ? _copy_from_user+0xfb/0x1b0 [ 2394.541234] kernel_clone+0xe7/0x980 [ 2394.541530] ? lock_acquire+0x197/0x470 [ 2394.541846] ? create_io_thread+0xf0/0xf0 [ 2394.542182] ? ksys_write+0x21a/0x260 [ 2394.542490] ? lock_downgrade+0x6d0/0x6d0 [ 2394.542823] __do_sys_clone3+0x1e5/0x320 [ 2394.543146] ? __do_sys_clone+0x110/0x110 [ 2394.543498] ? rcu_read_lock_any_held+0x75/0xa0 [ 2394.543881] ? vfs_write+0x354/0xa70 [ 2394.544180] ? fput_many+0x2f/0x1a0 [ 2394.544471] ? ksys_write+0x1a9/0x260 [ 2394.544786] ? __ia32_sys_read+0xb0/0xb0 [ 2394.545120] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2394.545536] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2394.545948] ? trace_hardirqs_on+0x5b/0x180 [ 2394.546307] do_syscall_64+0x33/0x40 [ 2394.546604] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2394.547010] RIP: 0033:0x7f7f3dd15b19 [ 2394.547310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2394.548761] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2394.549382] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2394.549947] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2394.550518] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2394.551085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2394.551653] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:31:45 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c", 0x13, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2394.617862] FAULT_INJECTION: forcing a failure. [ 2394.617862] name failslab, interval 1, probability 0, space 0, times 0 [ 2394.618862] CPU: 0 PID: 43658 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2394.619419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2394.620094] Call Trace: [ 2394.620313] dump_stack+0x107/0x167 [ 2394.620611] should_fail.cold+0x5/0xa [ 2394.620927] ? create_object.isra.0+0x3a/0xa20 [ 2394.621295] should_failslab+0x5/0x20 [ 2394.621602] kmem_cache_alloc+0x5b/0x310 [ 2394.621935] ? find_held_lock+0x2c/0x110 [ 2394.622307] create_object.isra.0+0x3a/0xa20 [ 2394.622765] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2394.623171] kmem_cache_alloc+0x159/0x310 [ 2394.623506] alloc_vfsmnt+0x23/0x680 [ 2394.623804] clone_mnt+0x6c/0xce0 [ 2394.624086] copy_tree+0x3b0/0xa60 [ 2394.624383] copy_mnt_ns+0x144/0xa00 [ 2394.624685] ? kmem_cache_alloc+0x2a6/0x310 [ 2394.625042] create_new_namespaces+0xd6/0xb20 [ 2394.625410] copy_namespaces+0x3fb/0x4f0 [ 2394.625734] copy_process+0x385b/0x7800 [ 2394.626059] ? mark_lock+0xf5/0x2df0 [ 2394.626371] ? lock_acquire+0x197/0x470 [ 2394.626697] ? __cleanup_sighand+0xb0/0xb0 [ 2394.627048] ? _copy_from_user+0xfb/0x1b0 [ 2394.627383] kernel_clone+0xe7/0x980 [ 2394.627678] ? lock_acquire+0x197/0x470 [ 2394.627999] ? create_io_thread+0xf0/0xf0 [ 2394.628342] ? ksys_write+0x21a/0x260 [ 2394.628647] ? lock_downgrade+0x6d0/0x6d0 [ 2394.628983] __do_sys_clone3+0x1e5/0x320 [ 2394.629308] ? __do_sys_clone+0x110/0x110 [ 2394.629652] ? rcu_read_lock_any_held+0x75/0xa0 [ 2394.630026] ? vfs_write+0x354/0xa70 [ 2394.630326] ? fput_many+0x2f/0x1a0 [ 2394.630619] ? ksys_write+0x1a9/0x260 [ 2394.630935] ? __ia32_sys_read+0xb0/0xb0 [ 2394.631275] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2394.631687] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2394.632089] ? trace_hardirqs_on+0x5b/0x180 [ 2394.632446] do_syscall_64+0x33/0x40 [ 2394.632754] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2394.633164] RIP: 0033:0x7f3d2b989b19 [ 2394.633461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2394.634930] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2394.635535] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2394.636104] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2394.636669] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2394.637237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2394.637803] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:31:45 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 55) [ 2394.878713] FAULT_INJECTION: forcing a failure. [ 2394.878713] name failslab, interval 1, probability 0, space 0, times 0 [ 2394.879677] CPU: 0 PID: 43669 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2394.880224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2394.880883] Call Trace: [ 2394.881106] dump_stack+0x107/0x167 [ 2394.881397] should_fail.cold+0x5/0xa [ 2394.881705] should_failslab+0x5/0x20 [ 2394.882008] __kmalloc_track_caller+0x79/0x370 [ 2394.882377] ? kstrdup_const+0x53/0x80 [ 2394.882701] kstrdup+0x36/0x70 [ 2394.882958] kstrdup_const+0x53/0x80 [ 2394.883259] alloc_vfsmnt+0xb5/0x680 [ 2394.883559] clone_mnt+0x6c/0xce0 [ 2394.883842] copy_tree+0x3b0/0xa60 [ 2394.884128] copy_mnt_ns+0x144/0xa00 [ 2394.884423] ? kmem_cache_alloc+0x2a6/0x310 [ 2394.884784] create_new_namespaces+0xd6/0xb20 [ 2394.885148] copy_namespaces+0x3fb/0x4f0 [ 2394.885475] copy_process+0x385b/0x7800 [ 2394.885797] ? mark_lock+0xf5/0x2df0 [ 2394.886098] ? lock_acquire+0x197/0x470 [ 2394.886431] ? __cleanup_sighand+0xb0/0xb0 [ 2394.886776] ? _copy_from_user+0xfb/0x1b0 [ 2394.887107] kernel_clone+0xe7/0x980 [ 2394.887415] ? lock_acquire+0x197/0x470 [ 2394.887731] ? create_io_thread+0xf0/0xf0 [ 2394.888073] ? ksys_write+0x21a/0x260 [ 2394.888383] ? lock_downgrade+0x6d0/0x6d0 [ 2394.888714] __do_sys_clone3+0x1e5/0x320 [ 2394.889039] ? __do_sys_clone+0x110/0x110 [ 2394.889377] ? rcu_read_lock_any_held+0x75/0xa0 [ 2394.889744] ? vfs_write+0x354/0xa70 [ 2394.890042] ? fput_many+0x2f/0x1a0 [ 2394.890337] ? ksys_write+0x1a9/0x260 [ 2394.890638] ? __ia32_sys_read+0xb0/0xb0 [ 2394.890966] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2394.891384] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2394.891790] ? trace_hardirqs_on+0x5b/0x180 [ 2394.892140] do_syscall_64+0x33/0x40 [ 2394.892437] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2394.892841] RIP: 0033:0x7f3d2b989b19 [ 2394.893137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2394.894600] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2394.895215] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2394.895784] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2394.896347] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2394.896913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2394.897478] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:32:00 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 52) 08:32:00 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 56) 08:32:00 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x44000, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) recvmmsg$unix(r2, &(0x7f0000000400)=[{{&(0x7f0000000180), 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000000280)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/184, 0xb8}], 0x1, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xa0}}], 0x2, 0x0, &(0x7f0000000600)={r3, r4+10000000}) waitid(0x1, r5, &(0x7f0000000640), 0x2, &(0x7f00000006c0)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) r6 = getpgrp(0x0) tgkill(r6, r6, 0x0) mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r7, 0x4c00, 0x0) ioctl$LOOP_SET_STATUS(r7, 0x4c02, 0x0) 08:32:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:32:00 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:00 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a9", 0xf, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:32:00 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2409.454205] FAULT_INJECTION: forcing a failure. [ 2409.454205] name failslab, interval 1, probability 0, space 0, times 0 [ 2409.457499] CPU: 0 PID: 43689 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2409.458554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2409.459908] Call Trace: [ 2409.460317] dump_stack+0x107/0x167 [ 2409.460867] should_fail.cold+0x5/0xa [ 2409.461445] ? create_object.isra.0+0x3a/0xa20 [ 2409.462136] should_failslab+0x5/0x20 [ 2409.462716] kmem_cache_alloc+0x5b/0x310 [ 2409.463326] create_object.isra.0+0x3a/0xa20 [ 2409.463993] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2409.464754] __kmalloc_track_caller+0x177/0x370 [ 2409.465460] ? kstrdup_const+0x53/0x80 [ 2409.466059] kstrdup+0x36/0x70 [ 2409.466545] kstrdup_const+0x53/0x80 [ 2409.467103] alloc_vfsmnt+0xb5/0x680 [ 2409.467657] clone_mnt+0x6c/0xce0 [ 2409.468187] copy_tree+0x3b0/0xa60 [ 2409.468723] copy_mnt_ns+0x144/0xa00 [ 2409.469282] ? kmem_cache_alloc+0x2a6/0x310 [ 2409.469935] create_new_namespaces+0xd6/0xb20 [ 2409.470620] copy_namespaces+0x3fb/0x4f0 [ 2409.471236] copy_process+0x385b/0x7800 [ 2409.471834] ? mark_lock+0xf5/0x2df0 [ 2409.472403] ? lock_acquire+0x197/0x470 [ 2409.473020] ? __cleanup_sighand+0xb0/0xb0 [ 2409.473670] ? _copy_from_user+0xfb/0x1b0 [ 2409.474291] kernel_clone+0xe7/0x980 [ 2409.474851] ? lock_acquire+0x197/0x470 [ 2409.475439] ? create_io_thread+0xf0/0xf0 [ 2409.476071] ? ksys_write+0x21a/0x260 [ 2409.476642] ? lock_downgrade+0x6d0/0x6d0 [ 2409.477262] __do_sys_clone3+0x1e5/0x320 [ 2409.477869] ? __do_sys_clone+0x110/0x110 [ 2409.478513] ? rcu_read_lock_any_held+0x75/0xa0 [ 2409.479215] ? vfs_write+0x354/0xa70 [ 2409.479766] ? fput_many+0x2f/0x1a0 [ 2409.480318] ? ksys_write+0x1a9/0x260 [ 2409.480888] ? __ia32_sys_read+0xb0/0xb0 [ 2409.481502] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2409.482292] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2409.483069] ? trace_hardirqs_on+0x5b/0x180 [ 2409.483714] do_syscall_64+0x33/0x40 [ 2409.484274] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2409.484991] RIP: 0033:0x7f3d2b989b19 [ 2409.485544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2409.488311] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2409.489442] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2409.490515] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2409.491584] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2409.492648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2409.493719] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2409.505033] FAULT_INJECTION: forcing a failure. [ 2409.505033] name failslab, interval 1, probability 0, space 0, times 0 [ 2409.507406] CPU: 1 PID: 43688 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2409.508495] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2409.509797] Call Trace: [ 2409.510231] dump_stack+0x107/0x167 [ 2409.510831] should_fail.cold+0x5/0xa [ 2409.511445] ? create_object.isra.0+0x3a/0xa20 [ 2409.512178] should_failslab+0x5/0x20 [ 2409.512831] kmem_cache_alloc+0x5b/0x310 [ 2409.513620] ? mark_held_locks+0x9e/0xe0 [ 2409.514269] create_object.isra.0+0x3a/0xa20 [ 2409.514972] kmemleak_alloc_percpu+0xa0/0x100 [ 2409.515687] pcpu_alloc+0x4e2/0x1240 [ 2409.516299] alloc_vfsmnt+0xfd/0x680 [ 2409.516895] clone_mnt+0x6c/0xce0 [ 2409.517611] ? copy_tree+0x64f/0xa60 [ 2409.518295] copy_tree+0x3b0/0xa60 [ 2409.518880] copy_mnt_ns+0x144/0xa00 [ 2409.519475] ? kmem_cache_alloc+0x2a6/0x310 [ 2409.520171] create_new_namespaces+0xd6/0xb20 [ 2409.520898] copy_namespaces+0x3fb/0x4f0 [ 2409.521549] copy_process+0x385b/0x7800 [ 2409.522185] ? mark_lock+0xf5/0x2df0 [ 2409.522791] ? lock_acquire+0x197/0x470 [ 2409.523443] ? __cleanup_sighand+0xb0/0xb0 [ 2409.524135] ? _copy_from_user+0xfb/0x1b0 [ 2409.524799] kernel_clone+0xe7/0x980 [ 2409.525394] ? lock_acquire+0x197/0x470 [ 2409.526040] ? create_io_thread+0xf0/0xf0 [ 2409.526721] ? ksys_write+0x21a/0x260 [ 2409.527327] ? lock_downgrade+0x6d0/0x6d0 [ 2409.527990] __do_sys_clone3+0x1e5/0x320 [ 2409.528631] ? __do_sys_clone+0x110/0x110 [ 2409.529314] ? rcu_read_lock_any_held+0x75/0xa0 [ 2409.530059] ? vfs_write+0x354/0xa70 [ 2409.530662] ? fput_many+0x2f/0x1a0 [ 2409.531251] ? ksys_write+0x1a9/0x260 [ 2409.531860] ? __ia32_sys_read+0xb0/0xb0 [ 2409.532518] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2409.533350] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2409.534170] ? trace_hardirqs_on+0x5b/0x180 [ 2409.534870] do_syscall_64+0x33/0x40 [ 2409.535467] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2409.536291] RIP: 0033:0x7f7f3dd15b19 [ 2409.536883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2409.539784] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2409.540991] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2409.542117] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2409.543242] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2409.544368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2409.545490] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:32:00 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 57) 08:32:00 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 53) [ 2409.765691] FAULT_INJECTION: forcing a failure. [ 2409.765691] name failslab, interval 1, probability 0, space 0, times 0 [ 2409.767523] CPU: 1 PID: 43714 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2409.768620] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2409.769930] Call Trace: [ 2409.770357] dump_stack+0x107/0x167 [ 2409.770950] should_fail.cold+0x5/0xa [ 2409.771563] ? create_object.isra.0+0x3a/0xa20 [ 2409.772295] should_failslab+0x5/0x20 [ 2409.772906] kmem_cache_alloc+0x5b/0x310 [ 2409.773559] create_object.isra.0+0x3a/0xa20 [ 2409.774272] kmemleak_alloc_percpu+0xa0/0x100 [ 2409.775008] pcpu_alloc+0x4e2/0x1240 [ 2409.775635] alloc_vfsmnt+0xfd/0x680 [ 2409.776238] clone_mnt+0x6c/0xce0 [ 2409.776814] copy_tree+0x3b0/0xa60 [ 2409.777406] copy_mnt_ns+0x144/0xa00 [ 2409.778011] ? kmem_cache_alloc+0x2a6/0x310 [ 2409.778733] create_new_namespaces+0xd6/0xb20 [ 2409.779467] copy_namespaces+0x3fb/0x4f0 [ 2409.780121] copy_process+0x385b/0x7800 [ 2409.780760] ? mark_lock+0xf5/0x2df0 [ 2409.781344] ? lock_acquire+0x197/0x470 [ 2409.782003] ? __cleanup_sighand+0xb0/0xb0 [ 2409.782703] ? _copy_from_user+0xfb/0x1b0 [ 2409.783374] kernel_clone+0xe7/0x980 [ 2409.783970] ? lock_acquire+0x197/0x470 [ 2409.784606] ? create_io_thread+0xf0/0xf0 [ 2409.785281] ? ksys_write+0x21a/0x260 [ 2409.785888] ? lock_downgrade+0x6d0/0x6d0 [ 2409.786562] __do_sys_clone3+0x1e5/0x320 [ 2409.787209] ? __do_sys_clone+0x110/0x110 [ 2409.787899] ? rcu_read_lock_any_held+0x75/0xa0 [ 2409.788641] ? vfs_write+0x354/0xa70 [ 2409.789238] ? fput_many+0x2f/0x1a0 [ 2409.789826] ? ksys_write+0x1a9/0x260 [ 2409.790461] ? __ia32_sys_read+0xb0/0xb0 [ 2409.791117] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2409.791951] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2409.792768] ? trace_hardirqs_on+0x5b/0x180 [ 2409.793460] do_syscall_64+0x33/0x40 [ 2409.794054] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2409.794909] RIP: 0033:0x7f3d2b989b19 [ 2409.795503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2409.798373] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2409.799540] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2409.800664] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2409.801790] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2409.802921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2409.804015] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2409.871546] FAULT_INJECTION: forcing a failure. [ 2409.871546] name failslab, interval 1, probability 0, space 0, times 0 [ 2409.873731] CPU: 0 PID: 43716 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2409.874923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2409.876333] Call Trace: [ 2409.876794] dump_stack+0x107/0x167 [ 2409.877424] should_fail.cold+0x5/0xa [ 2409.878089] ? alloc_vfsmnt+0x23/0x680 [ 2409.878773] should_failslab+0x5/0x20 [ 2409.879432] kmem_cache_alloc+0x5b/0x310 [ 2409.880132] ? copy_tree+0x61a/0xa60 [ 2409.880778] alloc_vfsmnt+0x23/0x680 [ 2409.881423] clone_mnt+0x6c/0xce0 [ 2409.882033] copy_tree+0x3b0/0xa60 [ 2409.882663] copy_mnt_ns+0x144/0xa00 [ 2409.883303] ? kmem_cache_alloc+0x2a6/0x310 [ 2409.884162] create_new_namespaces+0xd6/0xb20 [ 2409.884941] copy_namespaces+0x3fb/0x4f0 [ 2409.885640] copy_process+0x385b/0x7800 [ 2409.886321] ? mark_lock+0xf5/0x2df0 [ 2409.886984] ? lock_acquire+0x197/0x470 [ 2409.887690] ? __cleanup_sighand+0xb0/0xb0 [ 2409.888433] ? _copy_from_user+0xfb/0x1b0 [ 2409.889149] kernel_clone+0xe7/0x980 [ 2409.889779] ? lock_acquire+0x197/0x470 [ 2409.890460] ? create_io_thread+0xf0/0xf0 [ 2409.891186] ? ksys_write+0x21a/0x260 [ 2409.891837] ? lock_downgrade+0x6d0/0x6d0 [ 2409.892546] __do_sys_clone3+0x1e5/0x320 [ 2409.893231] ? __do_sys_clone+0x110/0x110 [ 2409.893952] ? rcu_read_lock_any_held+0x75/0xa0 [ 2409.894753] ? vfs_write+0x354/0xa70 [ 2409.895385] ? fput_many+0x2f/0x1a0 [ 2409.896003] ? ksys_write+0x1a9/0x260 [ 2409.896648] ? __ia32_sys_read+0xb0/0xb0 [ 2409.897341] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2409.898221] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2409.899101] ? trace_hardirqs_on+0x5b/0x180 [ 2409.899835] do_syscall_64+0x33/0x40 [ 2409.900463] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2409.901321] RIP: 0033:0x7f7f3dd15b19 [ 2409.901949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2409.905021] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2409.906298] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2409.907497] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2409.908690] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2409.909881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2409.911084] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:32:15 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 54) 08:32:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:32:15 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:15 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:32:15 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) r2 = gettid() tgkill(r2, r1, 0xf) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000001b000000070021004e61"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r3, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @void, @val={0xc, 0x99, {0x93c, 0x14}}}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x77}}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc0}, 0x40d5) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r4, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) r6 = openat(r4, &(0x7f0000000180)='./file0\x00', 0x0, 0x10) r7 = geteuid() sendmsg$nl_generic(r6, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)={0x598, 0x3a, 0x200, 0x70bd27, 0x25dfdbfb, {0x1}, [@nested={0x1c4, 0x4b, 0x0, 0x1, [@generic="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", @typed={0x8, 0x2, 0x0, 0x0, @fd=r5}, @typed={0xa, 0x1d, 0x0, 0x0, @str='-}.))\x00'}, @generic="421ef6daee0cb5e995d4a3fa3ca357313bba052d40e347800d5851d310a4eadad290c382616569f5aab9471a7c2ee7f55233b0ba1d02dddf4452e656b616c73125dbdf9e9d7954910961bdedd738a37ecfc3ee1a5581c6541005653069cd4f3aef618a30b0fa0f00953d7ffacb44d1d05e4eed55c79490c429de98e12999eaa98e659adde9c30968a34b8faa3f9bd6c52cf852a20312bbeeffeecb2a80aa2354563c2f2c966c59675c4a5e6f7c97"]}, @generic="c8e24f96722f8a1c5d3d8568eaa3683a73f289a3f728822f6575d4eae670865878c01a3c1dc05b673a84247b28a769cf9d6ebfc9fc10af62099a97c84e9706bddd959824426248de3978283826fdbc676c8ccf", @nested={0x36c, 0x70, 0x0, 0x1, [@generic="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", @generic="3b0a03e34b6f45511b83d9a59a96036c693fc58889694b09023b340d5a2d14a8d2568585a485d7de23eb9d637f48ad6d9b61c1937b85d05d000456334074442699fe73a758d2cb663049ed4ccf1b1d66bf18fc37bef3e3c0f32ffd692f2e5787649db370911392dcf47c83cf21f8bf835cf8fd8c58173d96648b5c564e37460f4a2939b31efadd651cf5e27bb2bd", @typed={0x8, 0x5b, 0x0, 0x0, @uid=r7}, @typed={0x8, 0x52, 0x0, 0x0, @uid=0xee01}, @generic="b867097cd2e2addc413cd31a2595057a528acb24efe234e897c5c35adedfa683831118adaeee41b0cd5097557223615330d2a6304ef60b990378a5e64ddd7f012cd34f710863151da7782a08c5b8367e0be4060f5d0869c8affc8d874298c78180f8ad8f80078ac5e2ffe0c5a62aa7713cbf588882d47e776fc4444ea19687412d85352bcedfb42b78f65ab8bee7193b397c7e6b6671008e058a430eb2fb38f09ea9195bd518919c1127e2da98b3578389d0ba3ec950e050ee2b3906a88ae1adf46133b81689614a06d9e324f4d65bce504ea62d269a9733b8aba443730e", @typed={0x5b, 0x1f, 0x0, 0x0, @binary="6daec1b9eb79dc81f397fffabc674d8f0874d2843cbbfac50c2c9b640a5105856089a552b1bfa7f84d124c1bda62ede5b280f25e99ecd4d12ed42227ac3d1d1e3ed53d4cc5d2a27a3d3f72447d74fd8c342ada21d769a0"}, @generic="5c6d48586459013132caa239d747e3318fdcbd5ffd74e1755fe1275f864582a968b66c82a138219e1bdc3ec3687aa37f8ed1c7a14972155bd0dacff419b71364ef418ac3edb5d7703345c37551b1759e97be4a06ea4ae3642095c0bce1f0e36bf4ad0a92e9d5b2530417bbc94443b05e4182d0629ab14c26a2b693b7962ae752722237d674d0bede86aecc4b57e07b668424c2"]}]}, 0x598}}, 0x4040005) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:32:15 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a9", 0xf, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:15 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 58) [ 2424.949551] FAULT_INJECTION: forcing a failure. [ 2424.949551] name failslab, interval 1, probability 0, space 0, times 0 [ 2424.951461] CPU: 0 PID: 43730 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2424.952593] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2424.953959] Call Trace: [ 2424.954412] dump_stack+0x107/0x167 [ 2424.955183] should_fail.cold+0x5/0xa [ 2424.955861] ? create_object.isra.0+0x3a/0xa20 [ 2424.956663] should_failslab+0x5/0x20 [ 2424.957327] kmem_cache_alloc+0x5b/0x310 [ 2424.958040] ? mark_held_locks+0x9e/0xe0 [ 2424.958766] create_object.isra.0+0x3a/0xa20 [ 2424.959539] kmemleak_alloc_percpu+0xa0/0x100 [ 2424.960320] pcpu_alloc+0x4e2/0x1240 [ 2424.961000] alloc_vfsmnt+0xfd/0x680 [ 2424.961656] clone_mnt+0x6c/0xce0 [ 2424.962279] copy_tree+0x3b0/0xa60 [ 2424.962923] copy_mnt_ns+0x144/0xa00 [ 2424.963567] ? kmem_cache_alloc+0x2a6/0x310 [ 2424.964312] create_new_namespaces+0xd6/0xb20 [ 2424.965086] copy_namespaces+0x3fb/0x4f0 [ 2424.965800] copy_process+0x385b/0x7800 [ 2424.966504] ? mark_lock+0xf5/0x2df0 [ 2424.967174] ? lock_acquire+0x197/0x470 [ 2424.967901] ? __cleanup_sighand+0xb0/0xb0 [ 2424.968640] ? _copy_from_user+0xfb/0x1b0 [ 2424.969368] kernel_clone+0xe7/0x980 [ 2424.970033] ? lock_acquire+0x197/0x470 [ 2424.970717] ? create_io_thread+0xf0/0xf0 [ 2424.971450] ? ksys_write+0x21a/0x260 [ 2424.972116] ? lock_downgrade+0x6d0/0x6d0 [ 2424.972857] __do_sys_clone3+0x1e5/0x320 [ 2424.973564] ? __do_sys_clone+0x110/0x110 [ 2424.974303] ? rcu_read_lock_any_held+0x75/0xa0 [ 2424.975125] ? vfs_write+0x354/0xa70 [ 2424.975756] ? fput_many+0x2f/0x1a0 [ 2424.976383] ? ksys_write+0x1a9/0x260 [ 2424.977051] ? __ia32_sys_read+0xb0/0xb0 [ 2424.977770] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2424.978682] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2424.979556] ? trace_hardirqs_on+0x5b/0x180 [ 2424.980310] do_syscall_64+0x33/0x40 [ 2424.980953] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2424.981831] RIP: 0033:0x7f3d2b989b19 [ 2424.982481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2424.985583] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2424.986945] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2424.988165] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2424.989384] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2424.990606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2424.991836] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2425.002551] FAULT_INJECTION: forcing a failure. [ 2425.002551] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.003546] CPU: 1 PID: 43733 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2425.004089] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2425.004735] Call Trace: [ 2425.004952] dump_stack+0x107/0x167 [ 2425.005242] should_fail.cold+0x5/0xa [ 2425.005548] ? create_object.isra.0+0x3a/0xa20 [ 2425.005912] should_failslab+0x5/0x20 [ 2425.006216] kmem_cache_alloc+0x5b/0x310 [ 2425.006536] ? find_held_lock+0x2c/0x110 [ 2425.006869] create_object.isra.0+0x3a/0xa20 [ 2425.007217] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2425.007618] kmem_cache_alloc+0x159/0x310 [ 2425.007954] alloc_vfsmnt+0x23/0x680 [ 2425.008253] clone_mnt+0x6c/0xce0 [ 2425.008532] copy_tree+0x3b0/0xa60 [ 2425.008837] copy_mnt_ns+0x144/0xa00 [ 2425.009133] ? kmem_cache_alloc+0x2a6/0x310 [ 2425.009483] create_new_namespaces+0xd6/0xb20 [ 2425.009840] copy_namespaces+0x3fb/0x4f0 [ 2425.010171] copy_process+0x385b/0x7800 [ 2425.010483] ? mark_lock+0xf5/0x2df0 [ 2425.010789] ? lock_acquire+0x197/0x470 [ 2425.011116] ? __cleanup_sighand+0xb0/0xb0 [ 2425.011461] ? _copy_from_user+0xfb/0x1b0 [ 2425.011797] kernel_clone+0xe7/0x980 [ 2425.012093] ? lock_acquire+0x197/0x470 [ 2425.012409] ? create_io_thread+0xf0/0xf0 [ 2425.012743] ? ksys_write+0x21a/0x260 [ 2425.013043] ? lock_downgrade+0x6d0/0x6d0 [ 2425.013376] __do_sys_clone3+0x1e5/0x320 [ 2425.013694] ? __do_sys_clone+0x110/0x110 [ 2425.014037] ? rcu_read_lock_any_held+0x75/0xa0 [ 2425.014401] ? vfs_write+0x354/0xa70 [ 2425.014700] ? fput_many+0x2f/0x1a0 [ 2425.014989] ? ksys_write+0x1a9/0x260 [ 2425.015295] ? __ia32_sys_read+0xb0/0xb0 [ 2425.015615] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2425.016033] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2425.016441] ? trace_hardirqs_on+0x5b/0x180 [ 2425.016786] do_syscall_64+0x33/0x40 [ 2425.017087] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2425.017492] RIP: 0033:0x7f7f3dd15b19 [ 2425.017787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2425.019230] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2425.019829] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2425.020387] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2425.020942] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2425.021501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2425.022056] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:32:16 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 55) [ 2425.198156] FAULT_INJECTION: forcing a failure. [ 2425.198156] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.199292] CPU: 1 PID: 43759 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2425.199859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2425.200536] Call Trace: [ 2425.200758] dump_stack+0x107/0x167 [ 2425.201058] should_fail.cold+0x5/0xa [ 2425.201382] should_failslab+0x5/0x20 [ 2425.201693] __kmalloc_track_caller+0x79/0x370 [ 2425.202066] ? kstrdup_const+0x53/0x80 [ 2425.202384] kstrdup+0x36/0x70 [ 2425.202656] kstrdup_const+0x53/0x80 [ 2425.202970] alloc_vfsmnt+0xb5/0x680 [ 2425.203277] clone_mnt+0x6c/0xce0 [ 2425.203562] copy_tree+0x3b0/0xa60 [ 2425.203859] copy_mnt_ns+0x144/0xa00 [ 2425.204159] ? kmem_cache_alloc+0x2a6/0x310 [ 2425.204520] create_new_namespaces+0xd6/0xb20 [ 2425.204890] copy_namespaces+0x3fb/0x4f0 [ 2425.205225] copy_process+0x385b/0x7800 [ 2425.205651] ? lock_acquire+0x1b9/0x470 [ 2425.206038] ? __cleanup_sighand+0xb0/0xb0 [ 2425.206392] ? _copy_from_user+0xfb/0x1b0 [ 2425.206735] kernel_clone+0xe7/0x980 [ 2425.207035] ? create_io_thread+0xf0/0xf0 [ 2425.207372] ? perf_event_sched_in.isra.0+0x80/0x80 [ 2425.207773] __do_sys_clone3+0x1e5/0x320 [ 2425.208100] ? __do_sys_clone+0x110/0x110 [ 2425.208430] ? finish_task_switch+0x126/0x5d0 [ 2425.208794] ? finish_task_switch+0xef/0x5d0 [ 2425.209162] ? io_schedule_timeout+0x140/0x140 [ 2425.209538] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 2425.209906] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 2425.210346] ? ksys_write+0x1a9/0x260 [ 2425.210664] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2425.211082] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2425.211512] ? trace_hardirqs_on+0x5b/0x180 [ 2425.211862] do_syscall_64+0x33/0x40 [ 2425.212167] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2425.212586] RIP: 0033:0x7f7f3dd15b19 [ 2425.212885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2425.214476] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2425.215105] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2425.215778] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2425.216348] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2425.216914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2425.217485] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:32:16 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 56) [ 2425.243957] FAULT_INJECTION: forcing a failure. [ 2425.243957] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.244915] CPU: 1 PID: 43761 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2425.245454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2425.246099] Call Trace: [ 2425.246312] dump_stack+0x107/0x167 [ 2425.246603] should_fail.cold+0x5/0xa [ 2425.246914] ? create_object.isra.0+0x3a/0xa20 [ 2425.247276] should_failslab+0x5/0x20 [ 2425.247580] kmem_cache_alloc+0x5b/0x310 [ 2425.247901] create_object.isra.0+0x3a/0xa20 [ 2425.248244] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2425.248644] __kmalloc_track_caller+0x177/0x370 [ 2425.249009] ? kstrdup_const+0x53/0x80 [ 2425.249318] kstrdup+0x36/0x70 [ 2425.249572] kstrdup_const+0x53/0x80 [ 2425.249866] alloc_vfsmnt+0xb5/0x680 [ 2425.250160] clone_mnt+0x6c/0xce0 [ 2425.250439] copy_tree+0x3b0/0xa60 [ 2425.250729] copy_mnt_ns+0x144/0xa00 [ 2425.251026] ? kmem_cache_alloc+0x2a6/0x310 [ 2425.251367] create_new_namespaces+0xd6/0xb20 [ 2425.251723] copy_namespaces+0x3fb/0x4f0 [ 2425.252052] copy_process+0x385b/0x7800 [ 2425.252367] ? mark_lock+0xf5/0x2df0 [ 2425.252661] ? lock_acquire+0x197/0x470 [ 2425.252981] ? __cleanup_sighand+0xb0/0xb0 [ 2425.253321] ? _copy_from_user+0xfb/0x1b0 [ 2425.253649] kernel_clone+0xe7/0x980 [ 2425.253942] ? lock_acquire+0x197/0x470 [ 2425.254254] ? create_io_thread+0xf0/0xf0 [ 2425.254592] ? ksys_write+0x21a/0x260 [ 2425.254896] ? lock_downgrade+0x6d0/0x6d0 [ 2425.255234] __do_sys_clone3+0x1e5/0x320 [ 2425.255560] ? __do_sys_clone+0x110/0x110 [ 2425.255898] ? rcu_read_lock_any_held+0x75/0xa0 [ 2425.256262] ? vfs_write+0x354/0xa70 [ 2425.256555] ? fput_many+0x2f/0x1a0 [ 2425.256842] ? ksys_write+0x1a9/0x260 [ 2425.257141] ? __ia32_sys_read+0xb0/0xb0 [ 2425.257461] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2425.257872] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2425.258273] ? trace_hardirqs_on+0x5b/0x180 [ 2425.258612] do_syscall_64+0x33/0x40 [ 2425.258910] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2425.259309] RIP: 0033:0x7f7f3dd15b19 [ 2425.259701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2425.261293] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2425.261883] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2425.262435] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2425.262996] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2425.263547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2425.264100] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:32:16 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 57) [ 2425.319721] FAULT_INJECTION: forcing a failure. [ 2425.319721] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.320692] CPU: 1 PID: 43765 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2425.321231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2425.321875] Call Trace: [ 2425.322088] dump_stack+0x107/0x167 [ 2425.322377] should_fail.cold+0x5/0xa [ 2425.322693] ? create_object.isra.0+0x3a/0xa20 [ 2425.323056] should_failslab+0x5/0x20 [ 2425.323361] kmem_cache_alloc+0x5b/0x310 [ 2425.323683] create_object.isra.0+0x3a/0xa20 [ 2425.324032] kmemleak_alloc_percpu+0xa0/0x100 [ 2425.324386] pcpu_alloc+0x4e2/0x1240 [ 2425.324691] alloc_vfsmnt+0xfd/0x680 [ 2425.324985] clone_mnt+0x6c/0xce0 [ 2425.325288] copy_tree+0x3b0/0xa60 [ 2425.325573] copy_mnt_ns+0x144/0xa00 [ 2425.325874] ? kmem_cache_alloc+0x2a6/0x310 [ 2425.326220] create_new_namespaces+0xd6/0xb20 [ 2425.326571] copy_namespaces+0x3fb/0x4f0 [ 2425.326902] copy_process+0x385b/0x7800 [ 2425.327217] ? mark_lock+0xf5/0x2df0 [ 2425.327510] ? lock_acquire+0x197/0x470 [ 2425.327828] ? __cleanup_sighand+0xb0/0xb0 [ 2425.328165] ? _copy_from_user+0xfb/0x1b0 [ 2425.328500] kernel_clone+0xe7/0x980 [ 2425.328791] ? lock_acquire+0x197/0x470 [ 2425.329102] ? create_io_thread+0xf0/0xf0 [ 2425.329434] ? ksys_write+0x21a/0x260 [ 2425.329734] ? lock_downgrade+0x6d0/0x6d0 [ 2425.330060] __do_sys_clone3+0x1e5/0x320 [ 2425.330382] ? __do_sys_clone+0x110/0x110 [ 2425.330729] ? rcu_read_lock_any_held+0x75/0xa0 [ 2425.331089] ? vfs_write+0x354/0xa70 [ 2425.331380] ? fput_many+0x2f/0x1a0 [ 2425.331663] ? ksys_write+0x1a9/0x260 [ 2425.331964] ? __ia32_sys_read+0xb0/0xb0 [ 2425.332287] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2425.332697] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2425.333097] ? trace_hardirqs_on+0x5b/0x180 [ 2425.333440] do_syscall_64+0x33/0x40 [ 2425.333731] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2425.334131] RIP: 0033:0x7f7f3dd15b19 [ 2425.334422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2425.335850] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2425.336448] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2425.336995] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2425.337540] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2425.338087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2425.338652] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:32:16 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 59) 08:32:16 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 58) [ 2425.505415] FAULT_INJECTION: forcing a failure. [ 2425.505415] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.507311] CPU: 0 PID: 43770 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2425.508410] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2425.509724] Call Trace: [ 2425.510158] dump_stack+0x107/0x167 [ 2425.510755] should_fail.cold+0x5/0xa [ 2425.511367] ? alloc_vfsmnt+0x23/0x680 [ 2425.511996] should_failslab+0x5/0x20 [ 2425.512607] kmem_cache_alloc+0x5b/0x310 [ 2425.513259] ? copy_tree+0x61a/0xa60 [ 2425.513858] alloc_vfsmnt+0x23/0x680 [ 2425.514457] clone_mnt+0x6c/0xce0 [ 2425.515029] copy_tree+0x3b0/0xa60 [ 2425.515611] copy_mnt_ns+0x144/0xa00 [ 2425.516209] ? kmem_cache_alloc+0x2a6/0x310 [ 2425.516902] create_new_namespaces+0xd6/0xb20 [ 2425.517625] copy_namespaces+0x3fb/0x4f0 [ 2425.518281] copy_process+0x385b/0x7800 [ 2425.518924] ? mark_lock+0xf5/0x2df0 [ 2425.519527] ? lock_acquire+0x197/0x470 [ 2425.520181] ? __cleanup_sighand+0xb0/0xb0 [ 2425.520872] ? _copy_from_user+0xfb/0x1b0 [ 2425.521541] kernel_clone+0xe7/0x980 [ 2425.522137] ? lock_acquire+0x197/0x470 [ 2425.522779] ? create_io_thread+0xf0/0xf0 [ 2425.523458] ? ksys_write+0x21a/0x260 [ 2425.524068] ? lock_downgrade+0x6d0/0x6d0 [ 2425.524733] __do_sys_clone3+0x1e5/0x320 [ 2425.525381] ? __do_sys_clone+0x110/0x110 [ 2425.526066] ? rcu_read_lock_any_held+0x75/0xa0 [ 2425.526811] ? vfs_write+0x354/0xa70 [ 2425.527409] ? fput_many+0x2f/0x1a0 [ 2425.527992] ? ksys_write+0x1a9/0x260 [ 2425.528603] ? __ia32_sys_read+0xb0/0xb0 [ 2425.529257] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2425.530095] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2425.530918] ? trace_hardirqs_on+0x5b/0x180 [ 2425.531615] do_syscall_64+0x33/0x40 [ 2425.532208] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2425.533025] RIP: 0033:0x7f3d2b989b19 [ 2425.533618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2425.536544] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2425.537758] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2425.538898] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2425.540031] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2425.541164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2425.542296] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2425.551493] FAULT_INJECTION: forcing a failure. [ 2425.551493] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.553689] CPU: 0 PID: 43769 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2425.554804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2425.556124] Call Trace: [ 2425.556550] dump_stack+0x107/0x167 [ 2425.557138] should_fail.cold+0x5/0xa [ 2425.557750] ? create_object.isra.0+0x3a/0xa20 [ 2425.558485] should_failslab+0x5/0x20 [ 2425.559105] kmem_cache_alloc+0x5b/0x310 [ 2425.559755] ? mark_held_locks+0x9e/0xe0 [ 2425.560411] create_object.isra.0+0x3a/0xa20 [ 2425.561122] kmemleak_alloc_percpu+0xa0/0x100 [ 2425.561846] pcpu_alloc+0x4e2/0x1240 [ 2425.562467] alloc_vfsmnt+0xfd/0x680 [ 2425.563078] clone_mnt+0x6c/0xce0 [ 2425.563648] copy_tree+0x3b0/0xa60 [ 2425.564234] copy_mnt_ns+0x144/0xa00 [ 2425.564843] ? kmem_cache_alloc+0x2a6/0x310 [ 2425.565543] create_new_namespaces+0xd6/0xb20 [ 2425.566276] copy_namespaces+0x3fb/0x4f0 [ 2425.566942] copy_process+0x385b/0x7800 [ 2425.567585] ? mark_lock+0xf5/0x2df0 [ 2425.568193] ? lock_acquire+0x197/0x470 [ 2425.568855] ? __cleanup_sighand+0xb0/0xb0 [ 2425.569553] ? _copy_from_user+0xfb/0x1b0 [ 2425.570227] kernel_clone+0xe7/0x980 [ 2425.570838] ? lock_acquire+0x197/0x470 [ 2425.571479] ? create_io_thread+0xf0/0xf0 [ 2425.572163] ? ksys_write+0x21a/0x260 [ 2425.572775] ? lock_downgrade+0x6d0/0x6d0 [ 2425.573447] __do_sys_clone3+0x1e5/0x320 [ 2425.574098] ? __do_sys_clone+0x110/0x110 [ 2425.574793] ? rcu_read_lock_any_held+0x75/0xa0 [ 2425.575542] ? vfs_write+0x354/0xa70 [ 2425.576140] ? fput_many+0x2f/0x1a0 [ 2425.576726] ? ksys_write+0x1a9/0x260 [ 2425.577338] ? __ia32_sys_read+0xb0/0xb0 [ 2425.577996] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2425.578836] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2425.579658] ? trace_hardirqs_on+0x5b/0x180 [ 2425.580355] do_syscall_64+0x33/0x40 [ 2425.580955] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2425.581775] RIP: 0033:0x7f7f3dd15b19 [ 2425.582375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2425.585308] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2425.586526] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2425.587672] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2425.588813] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2425.589955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2425.591110] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:32:16 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a9", 0xf, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:16 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:16 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 60) [ 2425.689103] FAULT_INJECTION: forcing a failure. [ 2425.689103] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.690116] CPU: 1 PID: 43779 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2425.690677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2425.691334] Call Trace: [ 2425.691552] dump_stack+0x107/0x167 [ 2425.691844] should_fail.cold+0x5/0xa [ 2425.692157] ? create_object.isra.0+0x3a/0xa20 [ 2425.692521] should_failslab+0x5/0x20 [ 2425.692825] kmem_cache_alloc+0x5b/0x310 [ 2425.693155] create_object.isra.0+0x3a/0xa20 [ 2425.693504] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2425.693908] kmem_cache_alloc+0x159/0x310 [ 2425.694246] alloc_vfsmnt+0x23/0x680 [ 2425.694550] clone_mnt+0x6c/0xce0 [ 2425.694848] copy_tree+0x3b0/0xa60 [ 2425.695141] copy_mnt_ns+0x144/0xa00 [ 2425.695441] ? kmem_cache_alloc+0x2a6/0x310 [ 2425.695795] create_new_namespaces+0xd6/0xb20 [ 2425.696158] copy_namespaces+0x3fb/0x4f0 [ 2425.696490] copy_process+0x385b/0x7800 [ 2425.696811] ? mark_lock+0xf5/0x2df0 [ 2425.697115] ? lock_acquire+0x197/0x470 [ 2425.697445] ? __cleanup_sighand+0xb0/0xb0 [ 2425.697794] ? _copy_from_user+0xfb/0x1b0 [ 2425.698132] kernel_clone+0xe7/0x980 [ 2425.698435] ? lock_acquire+0x197/0x470 [ 2425.698763] ? create_io_thread+0xf0/0xf0 [ 2425.699106] ? ksys_write+0x21a/0x260 [ 2425.699409] ? lock_downgrade+0x6d0/0x6d0 [ 2425.699746] __do_sys_clone3+0x1e5/0x320 [ 2425.700071] ? __do_sys_clone+0x110/0x110 [ 2425.700418] ? rcu_read_lock_any_held+0x75/0xa0 [ 2425.700791] ? vfs_write+0x354/0xa70 [ 2425.701095] ? fput_many+0x2f/0x1a0 [ 2425.701390] ? ksys_write+0x1a9/0x260 [ 2425.701695] ? __ia32_sys_read+0xb0/0xb0 [ 2425.702023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2425.702444] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2425.702860] ? trace_hardirqs_on+0x5b/0x180 [ 2425.703209] do_syscall_64+0x33/0x40 [ 2425.703507] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2425.703914] RIP: 0033:0x7f3d2b989b19 [ 2425.704208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2425.705666] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2425.706269] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2425.706841] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2425.707404] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2425.707972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2425.708539] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:32:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2427.020825] Bluetooth: hci7: command 0x0405 tx timeout 08:32:32 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 61) 08:32:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:32:32 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:32 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 59) 08:32:32 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r3, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x20010, r3, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x50, r2, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x4000010, r2, 0x8000000) syz_io_uring_complete(r4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:32:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:32:32 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:32 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b736", 0x12, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2441.240882] FAULT_INJECTION: forcing a failure. [ 2441.240882] name failslab, interval 1, probability 0, space 0, times 0 [ 2441.242856] CPU: 1 PID: 43808 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2441.244039] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2441.245315] Call Trace: [ 2441.245742] dump_stack+0x107/0x167 [ 2441.246302] should_fail.cold+0x5/0xa [ 2441.247052] should_failslab+0x5/0x20 [ 2441.247641] __kmalloc_track_caller+0x79/0x370 [ 2441.248471] ? kstrdup_const+0x53/0x80 [ 2441.249227] kstrdup+0x36/0x70 [ 2441.249726] kstrdup_const+0x53/0x80 [ 2441.250401] alloc_vfsmnt+0xb5/0x680 [ 2441.251150] clone_mnt+0x6c/0xce0 [ 2441.251737] copy_tree+0x3b0/0xa60 [ 2441.252332] copy_mnt_ns+0x144/0xa00 [ 2441.252918] ? kmem_cache_alloc+0x2a6/0x310 [ 2441.253633] create_new_namespaces+0xd6/0xb20 [ 2441.254379] copy_namespaces+0x3fb/0x4f0 [ 2441.255074] copy_process+0x385b/0x7800 [ 2441.255740] ? mark_lock+0xf5/0x2df0 [ 2441.256374] ? lock_acquire+0x197/0x470 [ 2441.257047] ? __cleanup_sighand+0xb0/0xb0 [ 2441.257756] ? _copy_from_user+0xfb/0x1b0 [ 2441.258433] kernel_clone+0xe7/0x980 [ 2441.259045] ? lock_acquire+0x197/0x470 [ 2441.259685] ? create_io_thread+0xf0/0xf0 [ 2441.260371] ? ksys_write+0x21a/0x260 [ 2441.260968] ? lock_downgrade+0x6d0/0x6d0 [ 2441.261629] __do_sys_clone3+0x1e5/0x320 [ 2441.262274] ? __do_sys_clone+0x110/0x110 [ 2441.263093] ? rcu_read_lock_any_held+0x75/0xa0 [ 2441.263913] ? vfs_write+0x354/0xa70 [ 2441.264539] ? fput_many+0x2f/0x1a0 [ 2441.265144] ? ksys_write+0x1a9/0x260 [ 2441.265768] ? __ia32_sys_read+0xb0/0xb0 [ 2441.266446] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2441.267325] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2441.268167] ? trace_hardirqs_on+0x5b/0x180 [ 2441.268894] do_syscall_64+0x33/0x40 [ 2441.269504] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2441.270306] RIP: 0033:0x7f3d2b989b19 [ 2441.270916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2441.274300] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2441.275460] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2441.276585] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2441.277753] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2441.278908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2441.280033] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2441.294707] FAULT_INJECTION: forcing a failure. [ 2441.294707] name failslab, interval 1, probability 0, space 0, times 0 [ 2441.296656] CPU: 1 PID: 43811 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2441.297719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2441.298990] Call Trace: [ 2441.299410] dump_stack+0x107/0x167 [ 2441.299982] should_fail.cold+0x5/0xa [ 2441.300578] ? alloc_vfsmnt+0x23/0x680 [ 2441.301179] should_failslab+0x5/0x20 [ 2441.301765] kmem_cache_alloc+0x5b/0x310 [ 2441.302389] ? copy_tree+0x61a/0xa60 [ 2441.302971] alloc_vfsmnt+0x23/0x680 [ 2441.303532] clone_mnt+0x6c/0xce0 [ 2441.304064] copy_tree+0x3b0/0xa60 [ 2441.304611] copy_mnt_ns+0x144/0xa00 [ 2441.305173] ? kmem_cache_alloc+0x2a6/0x310 [ 2441.305824] create_new_namespaces+0xd6/0xb20 [ 2441.306520] copy_namespaces+0x3fb/0x4f0 [ 2441.307166] copy_process+0x385b/0x7800 [ 2441.307785] ? mark_lock+0xf5/0x2df0 [ 2441.308357] ? lock_acquire+0x197/0x470 [ 2441.308973] ? __cleanup_sighand+0xb0/0xb0 [ 2441.309619] ? _copy_from_user+0xfb/0x1b0 [ 2441.310252] kernel_clone+0xe7/0x980 [ 2441.310820] ? lock_acquire+0x197/0x470 [ 2441.311441] ? create_io_thread+0xf0/0xf0 [ 2441.312090] ? ksys_write+0x21a/0x260 [ 2441.312688] ? lock_downgrade+0x6d0/0x6d0 [ 2441.313335] __do_sys_clone3+0x1e5/0x320 [ 2441.313955] ? __do_sys_clone+0x110/0x110 [ 2441.314636] ? rcu_read_lock_any_held+0x75/0xa0 [ 2441.315366] ? vfs_write+0x354/0xa70 [ 2441.315941] ? fput_many+0x2f/0x1a0 [ 2441.316500] ? ksys_write+0x1a9/0x260 [ 2441.317079] ? __ia32_sys_read+0xb0/0xb0 [ 2441.317687] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2441.318482] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2441.319281] ? trace_hardirqs_on+0x5b/0x180 [ 2441.319952] do_syscall_64+0x33/0x40 [ 2441.320529] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2441.321308] RIP: 0033:0x7f7f3dd15b19 [ 2441.321889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2441.324642] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2441.325846] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2441.327008] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2441.328150] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2441.329311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2441.330478] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2441.353672] audit: type=1400 audit(1709454752.408:14): avc: denied { map } for pid=43803 comm="syz-executor.7" path="pipe:[52606]" dev="pipefs" ino=52606 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 08:32:32 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 60) [ 2441.663400] FAULT_INJECTION: forcing a failure. [ 2441.663400] name failslab, interval 1, probability 0, space 0, times 0 [ 2441.665413] CPU: 1 PID: 43827 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2441.666550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2441.668099] Call Trace: [ 2441.668545] dump_stack+0x107/0x167 [ 2441.669131] should_fail.cold+0x5/0xa [ 2441.669743] ? create_object.isra.0+0x3a/0xa20 [ 2441.670482] should_failslab+0x5/0x20 [ 2441.671091] kmem_cache_alloc+0x5b/0x310 [ 2441.671740] ? find_held_lock+0x2c/0x110 [ 2441.672521] create_object.isra.0+0x3a/0xa20 [ 2441.673313] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2441.674162] kmem_cache_alloc+0x159/0x310 [ 2441.674853] ? trace_hardirqs_on+0x5b/0x180 [ 2441.675554] alloc_vfsmnt+0x23/0x680 [ 2441.676167] clone_mnt+0x6c/0xce0 [ 2441.676724] ? copy_tree+0x62b/0xa60 08:32:32 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 62) [ 2441.677450] copy_tree+0x3b0/0xa60 [ 2441.678266] copy_mnt_ns+0x144/0xa00 [ 2441.678895] ? kmem_cache_alloc+0x2a6/0x310 [ 2441.679592] create_new_namespaces+0xd6/0xb20 [ 2441.680317] copy_namespaces+0x3fb/0x4f0 [ 2441.680976] copy_process+0x385b/0x7800 [ 2441.681609] ? mark_lock+0xf5/0x2df0 [ 2441.682339] ? lock_acquire+0x197/0x470 [ 2441.683002] ? __cleanup_sighand+0xb0/0xb0 [ 2441.683829] ? _copy_from_user+0xfb/0x1b0 [ 2441.684623] kernel_clone+0xe7/0x980 [ 2441.685345] ? lock_acquire+0x197/0x470 [ 2441.685966] ? create_io_thread+0xf0/0xf0 [ 2441.686641] ? ksys_write+0x21a/0x260 [ 2441.687221] ? lock_downgrade+0x6d0/0x6d0 [ 2441.687855] __do_sys_clone3+0x1e5/0x320 [ 2441.688464] ? __do_sys_clone+0x110/0x110 [ 2441.689111] ? rcu_read_lock_any_held+0x75/0xa0 [ 2441.689803] ? vfs_write+0x354/0xa70 [ 2441.690367] ? fput_many+0x2f/0x1a0 [ 2441.690926] ? ksys_write+0x1a9/0x260 [ 2441.691518] ? __ia32_sys_read+0xb0/0xb0 [ 2441.692127] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2441.692927] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2441.693698] ? trace_hardirqs_on+0x5b/0x180 [ 2441.694490] do_syscall_64+0x33/0x40 [ 2441.695227] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2441.696214] RIP: 0033:0x7f7f3dd15b19 [ 2441.696872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2441.699893] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2441.701184] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2441.702336] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2441.703483] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2441.704813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2441.705948] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:32:32 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b736", 0x12, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2441.862048] FAULT_INJECTION: forcing a failure. [ 2441.862048] name failslab, interval 1, probability 0, space 0, times 0 [ 2441.863849] CPU: 1 PID: 43829 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2441.864850] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2441.866055] Call Trace: [ 2441.866458] dump_stack+0x107/0x167 [ 2441.867004] should_fail.cold+0x5/0xa [ 2441.867556] ? create_object.isra.0+0x3a/0xa20 [ 2441.868215] should_failslab+0x5/0x20 [ 2441.868760] kmem_cache_alloc+0x5b/0x310 [ 2441.869356] create_object.isra.0+0x3a/0xa20 [ 2441.870078] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2441.870815] __kmalloc_track_caller+0x177/0x370 [ 2441.871491] ? kstrdup_const+0x53/0x80 [ 2441.872050] kstrdup+0x36/0x70 [ 2441.872499] kstrdup_const+0x53/0x80 [ 2441.872997] alloc_vfsmnt+0xb5/0x680 [ 2441.873536] clone_mnt+0x6c/0xce0 [ 2441.874047] copy_tree+0x3b0/0xa60 [ 2441.874542] copy_mnt_ns+0x144/0xa00 [ 2441.875044] ? kmem_cache_alloc+0x2a6/0x310 [ 2441.875666] create_new_namespaces+0xd6/0xb20 [ 2441.876319] copy_namespaces+0x3fb/0x4f0 [ 2441.876905] copy_process+0x385b/0x7800 [ 2441.877479] ? mark_lock+0xf5/0x2df0 [ 2441.878020] ? lock_acquire+0x197/0x470 [ 2441.878607] ? __cleanup_sighand+0xb0/0xb0 [ 2441.879226] ? _copy_from_user+0xfb/0x1b0 [ 2441.879802] kernel_clone+0xe7/0x980 [ 2441.880275] ? lock_acquire+0x197/0x470 [ 2441.880782] ? create_io_thread+0xf0/0xf0 [ 2441.881320] ? ksys_write+0x21a/0x260 [ 2441.881858] ? lock_downgrade+0x6d0/0x6d0 [ 2441.882458] __do_sys_clone3+0x1e5/0x320 [ 2441.883009] ? __do_sys_clone+0x110/0x110 [ 2441.883626] ? rcu_read_lock_any_held+0x75/0xa0 [ 2441.884290] ? vfs_write+0x354/0xa70 [ 2441.884824] ? fput_many+0x2f/0x1a0 [ 2441.885347] ? ksys_write+0x1a9/0x260 [ 2441.885865] ? __ia32_sys_read+0xb0/0xb0 [ 2441.886451] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2441.887207] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2441.887940] ? trace_hardirqs_on+0x5b/0x180 [ 2441.888564] do_syscall_64+0x33/0x40 [ 2441.889097] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2441.889789] RIP: 0033:0x7f3d2b989b19 [ 2441.890319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2441.892936] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2441.894023] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2441.895038] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2441.896011] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2441.897029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2441.898051] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:32:33 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {0x0, 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:33 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 61) 08:32:33 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 63) [ 2442.128069] FAULT_INJECTION: forcing a failure. [ 2442.128069] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.129464] CPU: 0 PID: 43841 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2442.130210] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2442.131069] Call Trace: [ 2442.131354] dump_stack+0x107/0x167 [ 2442.131744] should_fail.cold+0x5/0xa [ 2442.132145] should_failslab+0x5/0x20 [ 2442.132556] __kmalloc_track_caller+0x79/0x370 [ 2442.133017] ? kstrdup_const+0x53/0x80 [ 2442.133417] kstrdup+0x36/0x70 [ 2442.133744] kstrdup_const+0x53/0x80 [ 2442.134121] alloc_vfsmnt+0xb5/0x680 [ 2442.134505] clone_mnt+0x6c/0xce0 [ 2442.134872] copy_tree+0x3b0/0xa60 [ 2442.135234] copy_mnt_ns+0x144/0xa00 [ 2442.135637] ? kmem_cache_alloc+0x2a6/0x310 [ 2442.136085] create_new_namespaces+0xd6/0xb20 [ 2442.136550] copy_namespaces+0x3fb/0x4f0 [ 2442.136953] copy_process+0x385b/0x7800 [ 2442.137367] ? mark_lock+0xf5/0x2df0 [ 2442.137757] ? lock_acquire+0x197/0x470 [ 2442.138175] ? __cleanup_sighand+0xb0/0xb0 [ 2442.138633] ? _copy_from_user+0xfb/0x1b0 [ 2442.139061] kernel_clone+0xe7/0x980 [ 2442.139465] ? lock_acquire+0x197/0x470 [ 2442.139872] ? create_io_thread+0xf0/0xf0 [ 2442.140305] ? ksys_write+0x21a/0x260 [ 2442.140705] ? lock_downgrade+0x6d0/0x6d0 [ 2442.141132] __do_sys_clone3+0x1e5/0x320 [ 2442.141560] ? __do_sys_clone+0x110/0x110 [ 2442.142003] ? rcu_read_lock_any_held+0x75/0xa0 [ 2442.142482] ? vfs_write+0x354/0xa70 [ 2442.142870] ? fput_many+0x2f/0x1a0 [ 2442.143239] ? ksys_write+0x1a9/0x260 [ 2442.143649] ? __ia32_sys_read+0xb0/0xb0 [ 2442.144069] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.144610] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.145133] ? trace_hardirqs_on+0x5b/0x180 [ 2442.145582] do_syscall_64+0x33/0x40 [ 2442.145959] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2442.146487] RIP: 0033:0x7f7f3dd15b19 [ 2442.146876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.148844] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2442.149812] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2442.150731] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2442.151661] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2442.152424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2442.153141] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:32:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:32:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:32:33 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) r3 = syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_l2cap(r3, &(0x7f0000000180)={0x1f, 0x1, @any, 0x3ff, 0x1}, 0xe) 08:32:33 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 62) [ 2442.201996] FAULT_INJECTION: forcing a failure. [ 2442.201996] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.203537] CPU: 1 PID: 43847 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2442.204371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2442.205376] Call Trace: [ 2442.205719] dump_stack+0x107/0x167 [ 2442.206178] should_fail.cold+0x5/0xa [ 2442.206666] ? create_object.isra.0+0x3a/0xa20 [ 2442.207255] should_failslab+0x5/0x20 [ 2442.207814] kmem_cache_alloc+0x5b/0x310 [ 2442.208414] create_object.isra.0+0x3a/0xa20 [ 2442.208980] kmemleak_alloc_percpu+0xa0/0x100 [ 2442.209552] pcpu_alloc+0x4e2/0x1240 [ 2442.210026] alloc_vfsmnt+0xfd/0x680 [ 2442.210480] clone_mnt+0x6c/0xce0 [ 2442.210928] copy_tree+0x3b0/0xa60 [ 2442.211363] copy_mnt_ns+0x144/0xa00 [ 2442.211824] ? kmem_cache_alloc+0x2a6/0x310 [ 2442.212370] create_new_namespaces+0xd6/0xb20 [ 2442.212934] copy_namespaces+0x3fb/0x4f0 [ 2442.213675] copy_process+0x385b/0x7800 [ 2442.214277] ? mark_lock+0xf5/0x2df0 [ 2442.214845] ? lock_acquire+0x197/0x470 [ 2442.215413] ? __cleanup_sighand+0xb0/0xb0 [ 2442.216029] ? _copy_from_user+0xfb/0x1b0 [ 2442.216641] kernel_clone+0xe7/0x980 [ 2442.217096] ? lock_acquire+0x197/0x470 [ 2442.217617] ? create_io_thread+0xf0/0xf0 [ 2442.218135] ? ksys_write+0x21a/0x260 [ 2442.218596] ? lock_downgrade+0x6d0/0x6d0 [ 2442.219132] __do_sys_clone3+0x1e5/0x320 [ 2442.219644] ? __do_sys_clone+0x110/0x110 [ 2442.220181] ? rcu_read_lock_any_held+0x75/0xa0 [ 2442.220766] ? vfs_write+0x354/0xa70 [ 2442.221275] ? fput_many+0x2f/0x1a0 [ 2442.221815] ? ksys_write+0x1a9/0x260 [ 2442.222298] ? __ia32_sys_read+0xb0/0xb0 [ 2442.222832] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.223475] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.224133] ? trace_hardirqs_on+0x5b/0x180 [ 2442.224658] do_syscall_64+0x33/0x40 [ 2442.225095] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2442.225719] RIP: 0033:0x7f3d2b989b19 [ 2442.226179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.228537] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2442.229466] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2442.230394] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2442.231266] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2442.232132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2442.233009] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:32:33 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2442.309629] FAULT_INJECTION: forcing a failure. [ 2442.309629] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.310978] CPU: 0 PID: 43852 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2442.311629] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2442.312396] Call Trace: [ 2442.312643] dump_stack+0x107/0x167 [ 2442.313076] should_fail.cold+0x5/0xa [ 2442.313500] ? create_object.isra.0+0x3a/0xa20 [ 2442.313935] should_failslab+0x5/0x20 [ 2442.314270] kmem_cache_alloc+0x5b/0x310 [ 2442.314657] create_object.isra.0+0x3a/0xa20 [ 2442.315078] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2442.315564] __kmalloc_track_caller+0x177/0x370 [ 2442.315991] ? kstrdup_const+0x53/0x80 [ 2442.316368] kstrdup+0x36/0x70 [ 2442.316675] kstrdup_const+0x53/0x80 [ 2442.317020] alloc_vfsmnt+0xb5/0x680 [ 2442.317371] clone_mnt+0x6c/0xce0 [ 2442.317697] copy_tree+0x3b0/0xa60 [ 2442.318028] copy_mnt_ns+0x144/0xa00 [ 2442.318378] ? kmem_cache_alloc+0x2a6/0x310 [ 2442.318782] create_new_namespaces+0xd6/0xb20 [ 2442.319206] copy_namespaces+0x3fb/0x4f0 [ 2442.319604] copy_process+0x385b/0x7800 [ 2442.319965] ? mark_lock+0xf5/0x2df0 [ 2442.320314] ? lock_acquire+0x197/0x470 [ 2442.320789] ? __cleanup_sighand+0xb0/0xb0 [ 2442.321198] ? _copy_from_user+0xfb/0x1b0 [ 2442.321587] kernel_clone+0xe7/0x980 [ 2442.321927] ? lock_acquire+0x197/0x470 [ 2442.322291] ? create_io_thread+0xf0/0xf0 [ 2442.322673] ? ksys_write+0x21a/0x260 [ 2442.323039] ? lock_downgrade+0x6d0/0x6d0 [ 2442.323435] __do_sys_clone3+0x1e5/0x320 [ 2442.323807] ? __do_sys_clone+0x110/0x110 [ 2442.324189] ? rcu_read_lock_any_held+0x75/0xa0 [ 2442.324620] ? vfs_write+0x354/0xa70 [ 2442.324967] ? fput_many+0x2f/0x1a0 [ 2442.325299] ? ksys_write+0x1a9/0x260 [ 2442.325660] ? __ia32_sys_read+0xb0/0xb0 [ 2442.326035] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.326523] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.326996] ? trace_hardirqs_on+0x5b/0x180 [ 2442.327405] do_syscall_64+0x33/0x40 [ 2442.327750] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2442.328201] RIP: 0033:0x7f7f3dd15b19 [ 2442.328551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.330196] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2442.330900] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2442.331554] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2442.332195] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2442.332850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2442.333510] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:32:33 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 64) 08:32:33 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 63) [ 2442.511557] FAULT_INJECTION: forcing a failure. [ 2442.511557] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.513139] CPU: 1 PID: 43865 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2442.513879] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2442.514749] Call Trace: [ 2442.515090] dump_stack+0x107/0x167 [ 2442.515478] should_fail.cold+0x5/0xa [ 2442.515883] ? create_object.isra.0+0x3a/0xa20 [ 2442.516403] should_failslab+0x5/0x20 [ 2442.516808] kmem_cache_alloc+0x5b/0x310 [ 2442.517245] create_object.isra.0+0x3a/0xa20 [ 2442.517713] kmemleak_alloc_percpu+0xa0/0x100 [ 2442.518190] pcpu_alloc+0x4e2/0x1240 [ 2442.518645] alloc_vfsmnt+0xfd/0x680 [ 2442.519108] clone_mnt+0x6c/0xce0 [ 2442.519481] copy_tree+0x3b0/0xa60 [ 2442.519870] copy_mnt_ns+0x144/0xa00 [ 2442.520270] ? kmem_cache_alloc+0x2a6/0x310 [ 2442.520727] create_new_namespaces+0xd6/0xb20 [ 2442.521208] copy_namespaces+0x3fb/0x4f0 [ 2442.521639] copy_process+0x385b/0x7800 [ 2442.522069] ? mark_lock+0xf5/0x2df0 [ 2442.522469] ? lock_acquire+0x197/0x470 [ 2442.522921] ? __cleanup_sighand+0xb0/0xb0 [ 2442.523380] ? _copy_from_user+0xfb/0x1b0 [ 2442.523873] kernel_clone+0xe7/0x980 [ 2442.524256] ? lock_acquire+0x197/0x470 [ 2442.524667] ? create_io_thread+0xf0/0xf0 [ 2442.525110] ? ksys_write+0x21a/0x260 [ 2442.525507] ? lock_downgrade+0x6d0/0x6d0 [ 2442.525949] __do_sys_clone3+0x1e5/0x320 [ 2442.526378] ? __do_sys_clone+0x110/0x110 [ 2442.526846] ? rcu_read_lock_any_held+0x75/0xa0 [ 2442.527331] ? vfs_write+0x354/0xa70 [ 2442.527726] ? fput_many+0x2f/0x1a0 [ 2442.528113] ? ksys_write+0x1a9/0x260 [ 2442.528514] ? __ia32_sys_read+0xb0/0xb0 [ 2442.528986] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.529540] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.530167] ? trace_hardirqs_on+0x5b/0x180 [ 2442.530694] do_syscall_64+0x33/0x40 [ 2442.531134] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2442.531770] RIP: 0033:0x7f7f3dd15b19 [ 2442.532195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.534255] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2442.535088] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2442.535830] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2442.536655] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2442.537420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2442.538191] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2442.564601] FAULT_INJECTION: forcing a failure. [ 2442.564601] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.565694] CPU: 0 PID: 43868 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2442.566272] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2442.566977] Call Trace: [ 2442.567210] dump_stack+0x107/0x167 [ 2442.567532] should_fail.cold+0x5/0xa [ 2442.567842] ? create_object.isra.0+0x3a/0xa20 [ 2442.568235] should_failslab+0x5/0x20 [ 2442.568568] kmem_cache_alloc+0x5b/0x310 [ 2442.568916] ? mark_held_locks+0x9e/0xe0 [ 2442.569245] create_object.isra.0+0x3a/0xa20 [ 2442.569639] kmemleak_alloc_percpu+0xa0/0x100 [ 2442.570028] pcpu_alloc+0x4e2/0x1240 [ 2442.570363] alloc_vfsmnt+0xfd/0x680 [ 2442.570681] clone_mnt+0x6c/0xce0 [ 2442.570987] copy_tree+0x3b0/0xa60 [ 2442.571297] copy_mnt_ns+0x144/0xa00 [ 2442.571613] ? kmem_cache_alloc+0x2a6/0x310 [ 2442.571992] create_new_namespaces+0xd6/0xb20 [ 2442.572367] copy_namespaces+0x3fb/0x4f0 [ 2442.572709] copy_process+0x385b/0x7800 [ 2442.573043] ? mark_lock+0xf5/0x2df0 [ 2442.573369] ? lock_acquire+0x197/0x470 [ 2442.573712] ? __cleanup_sighand+0xb0/0xb0 [ 2442.574073] ? _copy_from_user+0xfb/0x1b0 [ 2442.574441] kernel_clone+0xe7/0x980 [ 2442.574764] ? lock_acquire+0x197/0x470 [ 2442.575098] ? create_io_thread+0xf0/0xf0 [ 2442.575456] ? ksys_write+0x21a/0x260 [ 2442.575780] ? lock_downgrade+0x6d0/0x6d0 [ 2442.576120] __do_sys_clone3+0x1e5/0x320 [ 2442.576467] ? __do_sys_clone+0x110/0x110 [ 2442.576821] ? rcu_read_lock_any_held+0x75/0xa0 [ 2442.577206] ? vfs_write+0x354/0xa70 [ 2442.577526] ? fput_many+0x2f/0x1a0 [ 2442.577835] ? ksys_write+0x1a9/0x260 [ 2442.578151] ? __ia32_sys_read+0xb0/0xb0 [ 2442.578518] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.578964] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.579395] ? trace_hardirqs_on+0x5b/0x180 [ 2442.579763] do_syscall_64+0x33/0x40 [ 2442.580071] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2442.580509] RIP: 0033:0x7f3d2b989b19 [ 2442.580826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.582346] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2442.582999] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2442.583599] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2442.584194] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2442.584791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2442.585410] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:32:33 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 64) 08:32:33 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b736", 0x12, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2442.724130] FAULT_INJECTION: forcing a failure. [ 2442.724130] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.725581] CPU: 0 PID: 43872 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2442.726154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2442.726822] Call Trace: [ 2442.727055] dump_stack+0x107/0x167 [ 2442.727352] should_fail.cold+0x5/0xa [ 2442.727677] ? create_object.isra.0+0x3a/0xa20 [ 2442.728066] should_failslab+0x5/0x20 [ 2442.728386] kmem_cache_alloc+0x5b/0x310 [ 2442.728725] ? mark_held_locks+0x9e/0xe0 [ 2442.729061] create_object.isra.0+0x3a/0xa20 [ 2442.729437] kmemleak_alloc_percpu+0xa0/0x100 [ 2442.729808] pcpu_alloc+0x4e2/0x1240 [ 2442.730129] alloc_vfsmnt+0xfd/0x680 [ 2442.730437] clone_mnt+0x6c/0xce0 [ 2442.730729] copy_tree+0x3b0/0xa60 [ 2442.731041] copy_mnt_ns+0x144/0xa00 [ 2442.731362] ? kmem_cache_alloc+0x2a6/0x310 [ 2442.731721] create_new_namespaces+0xd6/0xb20 [ 2442.732092] copy_namespaces+0x3fb/0x4f0 [ 2442.732444] copy_process+0x385b/0x7800 [ 2442.732776] ? lock_acquire+0x1b9/0x470 [ 2442.733104] ? __cleanup_sighand+0xb0/0xb0 [ 2442.733460] ? _copy_from_user+0xfb/0x1b0 [ 2442.733807] kernel_clone+0xe7/0x980 [ 2442.734118] ? create_io_thread+0xf0/0xf0 [ 2442.734476] ? lock_downgrade+0x6d0/0x6d0 [ 2442.734842] ? enqueue_hrtimer+0x177/0x2e0 [ 2442.735204] __do_sys_clone3+0x1e5/0x320 [ 2442.735557] ? __do_sys_clone+0x110/0x110 [ 2442.735902] ? recalibrate_cpu_khz+0x10/0x10 [ 2442.736276] ? tick_program_event+0xa8/0x140 [ 2442.736655] ? hrtimer_interrupt+0x771/0x9b0 [ 2442.737022] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.737451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.737873] ? trace_hardirqs_on+0x5b/0x180 [ 2442.738230] do_syscall_64+0x33/0x40 [ 2442.738543] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2442.738971] RIP: 0033:0x7f7f3dd15b19 [ 2442.739277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.740805] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2442.741442] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2442.742028] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2442.742626] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2442.743228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2442.743823] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:32:33 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 65) [ 2442.804317] FAULT_INJECTION: forcing a failure. [ 2442.804317] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.805364] CPU: 0 PID: 43878 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2442.805926] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2442.806610] Call Trace: [ 2442.806834] dump_stack+0x107/0x167 [ 2442.807133] should_fail.cold+0x5/0xa [ 2442.807456] ? alloc_vfsmnt+0x23/0x680 [ 2442.807767] should_failslab+0x5/0x20 [ 2442.808077] kmem_cache_alloc+0x5b/0x310 [ 2442.808410] ? copy_tree+0x61a/0xa60 [ 2442.808724] alloc_vfsmnt+0x23/0x680 [ 2442.809018] clone_mnt+0x6c/0xce0 [ 2442.809321] copy_tree+0x3b0/0xa60 [ 2442.809622] copy_mnt_ns+0x144/0xa00 [ 2442.809920] ? kmem_cache_alloc+0x2a6/0x310 [ 2442.810279] create_new_namespaces+0xd6/0xb20 [ 2442.810658] copy_namespaces+0x3fb/0x4f0 [ 2442.811004] copy_process+0x385b/0x7800 [ 2442.811332] ? mark_lock+0xf5/0x2df0 [ 2442.811653] ? lock_acquire+0x197/0x470 [ 2442.811977] ? __cleanup_sighand+0xb0/0xb0 [ 2442.812326] ? _copy_from_user+0xfb/0x1b0 [ 2442.812677] kernel_clone+0xe7/0x980 [ 2442.812979] ? lock_acquire+0x197/0x470 [ 2442.813302] ? create_io_thread+0xf0/0xf0 [ 2442.813651] ? ksys_write+0x21a/0x260 [ 2442.813956] ? lock_downgrade+0x6d0/0x6d0 [ 2442.814288] __do_sys_clone3+0x1e5/0x320 [ 2442.814623] ? __do_sys_clone+0x110/0x110 [ 2442.814977] ? rcu_read_lock_any_held+0x75/0xa0 [ 2442.815366] ? vfs_write+0x354/0xa70 [ 2442.815674] ? fput_many+0x2f/0x1a0 [ 2442.815963] ? ksys_write+0x1a9/0x260 [ 2442.816271] ? __ia32_sys_read+0xb0/0xb0 [ 2442.816619] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.817054] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.817489] ? trace_hardirqs_on+0x5b/0x180 [ 2442.817848] do_syscall_64+0x33/0x40 [ 2442.818146] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2442.818566] RIP: 0033:0x7f3d2b989b19 [ 2442.818874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.820345] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2442.820951] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2442.821537] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2442.822104] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2442.822702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2442.823288] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:32:33 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {0x0, 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:33 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:34 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 66) 08:32:34 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 65) [ 2443.002674] FAULT_INJECTION: forcing a failure. [ 2443.002674] name failslab, interval 1, probability 0, space 0, times 0 [ 2443.003945] CPU: 0 PID: 43890 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2443.004527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2443.005189] Call Trace: [ 2443.005426] dump_stack+0x107/0x167 [ 2443.005719] should_fail.cold+0x5/0xa [ 2443.006036] ? alloc_vfsmnt+0x23/0x680 [ 2443.006364] should_failslab+0x5/0x20 [ 2443.006678] kmem_cache_alloc+0x5b/0x310 [ 2443.007021] ? copy_tree+0x61a/0xa60 [ 2443.007332] alloc_vfsmnt+0x23/0x680 [ 2443.007654] clone_mnt+0x6c/0xce0 [ 2443.007958] copy_tree+0x3b0/0xa60 [ 2443.008259] copy_mnt_ns+0x144/0xa00 [ 2443.008581] ? kmem_cache_alloc+0x2a6/0x310 [ 2443.008949] create_new_namespaces+0xd6/0xb20 [ 2443.009339] copy_namespaces+0x3fb/0x4f0 [ 2443.009684] copy_process+0x385b/0x7800 [ 2443.010015] ? mark_lock+0xf5/0x2df0 [ 2443.010328] ? lock_acquire+0x197/0x470 [ 2443.010672] ? __cleanup_sighand+0xb0/0xb0 [ 2443.011043] ? _copy_from_user+0xfb/0x1b0 [ 2443.011404] kernel_clone+0xe7/0x980 [ 2443.011710] ? lock_acquire+0x197/0x470 [ 2443.012026] ? create_io_thread+0xf0/0xf0 [ 2443.012390] ? ksys_write+0x21a/0x260 [ 2443.012703] ? lock_downgrade+0x6d0/0x6d0 [ 2443.013042] __do_sys_clone3+0x1e5/0x320 [ 2443.013395] ? __do_sys_clone+0x110/0x110 [ 2443.013752] ? rcu_read_lock_any_held+0x75/0xa0 [ 2443.014134] ? vfs_write+0x354/0xa70 [ 2443.014453] ? fput_many+0x2f/0x1a0 [ 2443.014755] ? ksys_write+0x1a9/0x260 [ 2443.015082] ? __ia32_sys_read+0xb0/0xb0 [ 2443.015423] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2443.015864] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2443.016284] ? trace_hardirqs_on+0x5b/0x180 [ 2443.016652] do_syscall_64+0x33/0x40 [ 2443.016950] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2443.017377] RIP: 0033:0x7f7f3dd15b19 [ 2443.017687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2443.019204] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2443.019817] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2443.020386] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2443.020946] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2443.021516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2443.022075] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2443.046808] FAULT_INJECTION: forcing a failure. [ 2443.046808] name failslab, interval 1, probability 0, space 0, times 0 [ 2443.047819] CPU: 1 PID: 43894 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2443.048389] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2443.049064] Call Trace: [ 2443.049285] dump_stack+0x107/0x167 [ 2443.049587] should_fail.cold+0x5/0xa [ 2443.049906] ? alloc_vfsmnt+0x23/0x680 [ 2443.050222] should_failslab+0x5/0x20 [ 2443.050534] kmem_cache_alloc+0x5b/0x310 [ 2443.050873] ? copy_tree+0x61a/0xa60 [ 2443.051187] alloc_vfsmnt+0x23/0x680 [ 2443.051488] clone_mnt+0x6c/0xce0 [ 2443.051778] copy_tree+0x3b0/0xa60 [ 2443.052081] copy_mnt_ns+0x144/0xa00 [ 2443.052388] ? kmem_cache_alloc+0x2a6/0x310 [ 2443.052748] create_new_namespaces+0xd6/0xb20 [ 2443.053132] copy_namespaces+0x3fb/0x4f0 [ 2443.053466] copy_process+0x385b/0x7800 [ 2443.053802] ? mark_lock+0xf5/0x2df0 [ 2443.054109] ? lock_acquire+0x197/0x470 [ 2443.054445] ? __cleanup_sighand+0xb0/0xb0 [ 2443.054798] ? _copy_from_user+0xfb/0x1b0 [ 2443.055157] kernel_clone+0xe7/0x980 [ 2443.055468] ? lock_acquire+0x197/0x470 [ 2443.055793] ? create_io_thread+0xf0/0xf0 [ 2443.056140] ? ksys_write+0x21a/0x260 [ 2443.056455] ? lock_downgrade+0x6d0/0x6d0 [ 2443.056794] __do_sys_clone3+0x1e5/0x320 [ 2443.057125] ? __do_sys_clone+0x110/0x110 [ 2443.057476] ? rcu_read_lock_any_held+0x75/0xa0 [ 2443.057856] ? vfs_write+0x354/0xa70 [ 2443.058161] ? fput_many+0x2f/0x1a0 [ 2443.058461] ? ksys_write+0x1a9/0x260 [ 2443.058773] ? __ia32_sys_read+0xb0/0xb0 [ 2443.059115] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2443.059541] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2443.059955] ? trace_hardirqs_on+0x5b/0x180 [ 2443.060308] do_syscall_64+0x33/0x40 [ 2443.060613] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2443.061031] RIP: 0033:0x7f3d2b989b19 [ 2443.061339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2443.062812] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2443.063440] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2443.064017] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2443.064596] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2443.065182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2443.065765] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:32:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:32:47 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 66) 08:32:47 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 67) 08:32:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:32:47 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv2(r0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f00000001c0)=""/209, 0xd1}, {&(0x7f00000002c0)=""/252, 0xfc}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x4, 0x7f, 0x5, 0x8) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r2 = getpgrp(0x0) tgkill(r2, r2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r2, 0x9, r3, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r1, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) fork() r4 = getpgrp(0x0) tgkill(r4, r4, 0x0) ptrace(0xffffffffffffffff, r4) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:32:47 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c", 0x13, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:47 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {0x0, 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:32:47 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {0x0, 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2456.683690] FAULT_INJECTION: forcing a failure. [ 2456.683690] name failslab, interval 1, probability 0, space 0, times 0 [ 2456.684809] CPU: 0 PID: 43915 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2456.685456] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.686216] Call Trace: [ 2456.686476] dump_stack+0x107/0x167 [ 2456.686806] should_fail.cold+0x5/0xa [ 2456.687175] should_failslab+0x5/0x20 [ 2456.687542] __kmalloc_track_caller+0x79/0x370 [ 2456.687958] ? kstrdup_const+0x53/0x80 [ 2456.688328] kstrdup+0x36/0x70 [ 2456.688629] kstrdup_const+0x53/0x80 [ 2456.688974] alloc_vfsmnt+0xb5/0x680 [ 2456.689370] clone_mnt+0x6c/0xce0 [ 2456.689780] copy_tree+0x3b0/0xa60 [ 2456.690197] copy_mnt_ns+0x144/0xa00 [ 2456.690626] ? kmem_cache_alloc+0x2a6/0x310 [ 2456.691138] create_new_namespaces+0xd6/0xb20 [ 2456.691668] copy_namespaces+0x3fb/0x4f0 [ 2456.692119] copy_process+0x385b/0x7800 [ 2456.692529] ? mark_lock+0xf5/0x2df0 [ 2456.692888] ? lock_acquire+0x197/0x470 [ 2456.693267] ? __cleanup_sighand+0xb0/0xb0 [ 2456.693689] ? _copy_from_user+0xfb/0x1b0 [ 2456.694083] kernel_clone+0xe7/0x980 [ 2456.694458] ? lock_acquire+0x197/0x470 [ 2456.694868] ? create_io_thread+0xf0/0xf0 [ 2456.695260] ? ksys_write+0x21a/0x260 [ 2456.695629] ? lock_downgrade+0x6d0/0x6d0 [ 2456.696009] __do_sys_clone3+0x1e5/0x320 [ 2456.696401] ? __do_sys_clone+0x110/0x110 [ 2456.696805] ? rcu_read_lock_any_held+0x75/0xa0 [ 2456.697219] ? vfs_write+0x354/0xa70 [ 2456.697579] ? fput_many+0x2f/0x1a0 [ 2456.697923] ? ksys_write+0x1a9/0x260 [ 2456.698273] ? __ia32_sys_read+0xb0/0xb0 [ 2456.698668] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.699161] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.699646] ? trace_hardirqs_on+0x5b/0x180 [ 2456.700041] do_syscall_64+0x33/0x40 [ 2456.700402] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2456.700881] RIP: 0033:0x7f3d2b989b19 [ 2456.701232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.702932] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2456.703629] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2456.704266] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2456.704923] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.705597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.706232] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2456.710239] FAULT_INJECTION: forcing a failure. [ 2456.710239] name failslab, interval 1, probability 0, space 0, times 0 [ 2456.711470] CPU: 0 PID: 43920 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2456.712113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.712873] Call Trace: [ 2456.713112] dump_stack+0x107/0x167 [ 2456.713475] should_fail.cold+0x5/0xa [ 2456.713821] ? create_object.isra.0+0x3a/0xa20 [ 2456.714227] should_failslab+0x5/0x20 [ 2456.714583] kmem_cache_alloc+0x5b/0x310 [ 2456.714951] ? find_held_lock+0x2c/0x110 [ 2456.715403] create_object.isra.0+0x3a/0xa20 [ 2456.715804] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2456.716271] kmem_cache_alloc+0x159/0x310 [ 2456.716670] alloc_vfsmnt+0x23/0x680 [ 2456.717014] clone_mnt+0x6c/0xce0 [ 2456.717350] copy_tree+0x3b0/0xa60 [ 2456.717683] copy_mnt_ns+0x144/0xa00 [ 2456.718024] ? kmem_cache_alloc+0x2a6/0x310 [ 2456.718438] create_new_namespaces+0xd6/0xb20 [ 2456.718852] copy_namespaces+0x3fb/0x4f0 [ 2456.719215] copy_process+0x385b/0x7800 [ 2456.719592] ? mark_lock+0xf5/0x2df0 [ 2456.719944] ? lock_acquire+0x197/0x470 [ 2456.720315] ? __cleanup_sighand+0xb0/0xb0 [ 2456.720717] ? _copy_from_user+0xfb/0x1b0 [ 2456.721089] kernel_clone+0xe7/0x980 [ 2456.721432] ? lock_acquire+0x197/0x470 [ 2456.721792] ? create_io_thread+0xf0/0xf0 [ 2456.722181] ? ksys_write+0x21a/0x260 [ 2456.722529] ? lock_downgrade+0x6d0/0x6d0 [ 2456.722919] __do_sys_clone3+0x1e5/0x320 [ 2456.723293] ? __do_sys_clone+0x110/0x110 [ 2456.723698] ? rcu_read_lock_any_held+0x75/0xa0 [ 2456.724134] ? vfs_write+0x354/0xa70 [ 2456.724482] ? fput_many+0x2f/0x1a0 [ 2456.724814] ? ksys_write+0x1a9/0x260 [ 2456.725155] ? __ia32_sys_read+0xb0/0xb0 [ 2456.725541] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.726018] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.726489] ? trace_hardirqs_on+0x5b/0x180 [ 2456.726878] do_syscall_64+0x33/0x40 [ 2456.727232] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2456.727698] RIP: 0033:0x7f7f3dd15b19 [ 2456.728030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.729700] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2456.730398] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2456.731052] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2456.731699] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.732338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.732980] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:33:02 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 68) 08:33:02 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x88001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) r4 = fcntl$getown(r3, 0x9) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x5, 0xff, 0x0, 0x1, 0x0, 0x3, 0x80c00, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x7f, 0x2}, 0x40, 0x4, 0x80000001, 0x9, 0x7, 0x2, 0x7fff, 0x0, 0x7, 0x0, 0xfa}, r4, 0x7, 0xffffffffffffffff, 0x9) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/bus/workqueue', 0x40080, 0x60) syz_io_uring_complete(0x0) 08:33:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2471.040607] FAULT_INJECTION: forcing a failure. [ 2471.040607] name failslab, interval 1, probability 0, space 0, times 0 [ 2471.041988] CPU: 1 PID: 43951 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2471.042829] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2471.043780] Call Trace: [ 2471.044095] dump_stack+0x107/0x167 [ 2471.044521] should_fail.cold+0x5/0xa [ 2471.045104] ? create_object.isra.0+0x3a/0xa20 [ 2471.045772] should_failslab+0x5/0x20 [ 2471.046301] kmem_cache_alloc+0x5b/0x310 [ 2471.046790] create_object.isra.0+0x3a/0xa20 [ 2471.047305] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2471.047892] __kmalloc_track_caller+0x177/0x370 [ 2471.048430] ? kstrdup_const+0x53/0x80 [ 2471.048882] kstrdup+0x36/0x70 [ 2471.049258] kstrdup_const+0x53/0x80 [ 2471.049686] alloc_vfsmnt+0xb5/0x680 [ 2471.050119] clone_mnt+0x6c/0xce0 [ 2471.050522] copy_tree+0x3b0/0xa60 [ 2471.050942] copy_mnt_ns+0x144/0xa00 08:33:02 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c", 0x13, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:02 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 67) 08:33:02 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {0x0, 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:02 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0), 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2471.051490] ? kmem_cache_alloc+0x2a6/0x310 [ 2471.052137] create_new_namespaces+0xd6/0xb20 [ 2471.052661] copy_namespaces+0x3fb/0x4f0 [ 2471.053135] copy_process+0x385b/0x7800 [ 2471.053598] ? mark_lock+0xf5/0x2df0 [ 2471.054033] ? lock_acquire+0x197/0x470 [ 2471.054504] ? __cleanup_sighand+0xb0/0xb0 [ 2471.055000] ? _copy_from_user+0xfb/0x1b0 [ 2471.055488] kernel_clone+0xe7/0x980 [ 2471.055920] ? lock_acquire+0x197/0x470 [ 2471.056377] ? create_io_thread+0xf0/0xf0 [ 2471.056871] ? ksys_write+0x21a/0x260 [ 2471.057310] ? lock_downgrade+0x6d0/0x6d0 [ 2471.057789] __do_sys_clone3+0x1e5/0x320 [ 2471.058253] ? __do_sys_clone+0x110/0x110 [ 2471.058740] ? rcu_read_lock_any_held+0x75/0xa0 [ 2471.059281] ? vfs_write+0x354/0xa70 [ 2471.059709] ? fput_many+0x2f/0x1a0 [ 2471.060130] ? ksys_write+0x1a9/0x260 [ 2471.060564] ? __ia32_sys_read+0xb0/0xb0 [ 2471.061032] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2471.061630] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2471.062217] ? trace_hardirqs_on+0x5b/0x180 [ 2471.062714] do_syscall_64+0x33/0x40 [ 2471.063139] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2471.063726] RIP: 0033:0x7f3d2b989b19 [ 2471.064154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2471.066225] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2471.067091] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2471.067905] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2471.068709] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2471.069524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2471.070335] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:02 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x5, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0xffff}, r1, 0x9, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 2471.117290] FAULT_INJECTION: forcing a failure. [ 2471.117290] name failslab, interval 1, probability 0, space 0, times 0 [ 2471.119508] CPU: 0 PID: 43945 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2471.120590] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2471.121868] Call Trace: [ 2471.122285] dump_stack+0x107/0x167 [ 2471.122866] should_fail.cold+0x5/0xa [ 2471.123476] should_failslab+0x5/0x20 [ 2471.124089] __kmalloc_track_caller+0x79/0x370 [ 2471.124792] ? kstrdup_const+0x53/0x80 [ 2471.125406] kstrdup+0x36/0x70 [ 2471.125925] kstrdup_const+0x53/0x80 [ 2471.126493] alloc_vfsmnt+0xb5/0x680 [ 2471.127082] clone_mnt+0x6c/0xce0 [ 2471.127638] copy_tree+0x3b0/0xa60 [ 2471.128226] copy_mnt_ns+0x144/0xa00 [ 2471.128814] ? kmem_cache_alloc+0x2a6/0x310 [ 2471.129480] create_new_namespaces+0xd6/0xb20 [ 2471.130189] copy_namespaces+0x3fb/0x4f0 [ 2471.130831] copy_process+0x385b/0x7800 [ 2471.131460] ? mark_lock+0xf5/0x2df0 [ 2471.132067] ? lock_acquire+0x197/0x470 [ 2471.132721] ? __cleanup_sighand+0xb0/0xb0 [ 2471.133562] ? _copy_from_user+0xfb/0x1b0 [ 2471.134219] kernel_clone+0xe7/0x980 [ 2471.134781] ? lock_acquire+0x197/0x470 [ 2471.135425] ? create_io_thread+0xf0/0xf0 [ 2471.136101] ? ksys_write+0x21a/0x260 [ 2471.136690] ? lock_downgrade+0x6d0/0x6d0 [ 2471.137391] __do_sys_clone3+0x1e5/0x320 [ 2471.138035] ? __do_sys_clone+0x110/0x110 [ 2471.138687] ? rcu_read_lock_any_held+0x75/0xa0 [ 2471.139420] ? vfs_write+0x354/0xa70 [ 2471.140018] ? fput_many+0x2f/0x1a0 [ 2471.140685] ? ksys_write+0x1a9/0x260 [ 2471.141456] ? __ia32_sys_read+0xb0/0xb0 [ 2471.142280] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2471.143336] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2471.144358] ? trace_hardirqs_on+0x5b/0x180 [ 2471.145227] do_syscall_64+0x33/0x40 [ 2471.145970] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2471.146981] RIP: 0033:0x7f7f3dd15b19 [ 2471.147738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2471.150569] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2471.151754] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2471.152875] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2471.153967] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2471.155062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2471.156183] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:33:02 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_l2cap(r0, &(0x7f00000001c0)={0x1f, 0x7f, @none, 0x1}, 0xe) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0xa, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xee64, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0x2, 0x9, 0x1, 0x1, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r3) r4 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) connect$bt_l2cap(r3, &(0x7f0000000180)={0x1f, 0xf28, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:33:02 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 68) [ 2471.268693] FAULT_INJECTION: forcing a failure. [ 2471.268693] name failslab, interval 1, probability 0, space 0, times 0 [ 2471.270025] CPU: 1 PID: 43974 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2471.270697] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2471.271510] Call Trace: [ 2471.271777] dump_stack+0x107/0x167 [ 2471.272135] should_fail.cold+0x5/0xa [ 2471.272516] ? create_object.isra.0+0x3a/0xa20 [ 2471.272966] should_failslab+0x5/0x20 [ 2471.273340] kmem_cache_alloc+0x5b/0x310 [ 2471.273742] create_object.isra.0+0x3a/0xa20 [ 2471.274177] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2471.274679] __kmalloc_track_caller+0x177/0x370 [ 2471.275141] ? kstrdup_const+0x53/0x80 [ 2471.275538] kstrdup+0x36/0x70 [ 2471.275859] kstrdup_const+0x53/0x80 [ 2471.276231] alloc_vfsmnt+0xb5/0x680 [ 2471.276603] clone_mnt+0x6c/0xce0 [ 2471.276956] copy_tree+0x3b0/0xa60 [ 2471.277319] copy_mnt_ns+0x144/0xa00 [ 2471.277689] ? kmem_cache_alloc+0x2a6/0x310 [ 2471.278118] create_new_namespaces+0xd6/0xb20 [ 2471.278563] copy_namespaces+0x3fb/0x4f0 [ 2471.278963] copy_process+0x385b/0x7800 [ 2471.279363] ? mark_lock+0xf5/0x2df0 [ 2471.279731] ? lock_acquire+0x197/0x470 [ 2471.280134] ? __cleanup_sighand+0xb0/0xb0 [ 2471.280563] ? _copy_from_user+0xfb/0x1b0 [ 2471.280974] kernel_clone+0xe7/0x980 [ 2471.281340] ? lock_acquire+0x197/0x470 [ 2471.281731] ? create_io_thread+0xf0/0xf0 [ 2471.282146] ? ksys_write+0x21a/0x260 [ 2471.282520] ? lock_downgrade+0x6d0/0x6d0 [ 2471.282932] __do_sys_clone3+0x1e5/0x320 [ 2471.283333] ? __do_sys_clone+0x110/0x110 [ 2471.283755] ? rcu_read_lock_any_held+0x75/0xa0 [ 2471.284210] ? vfs_write+0x354/0xa70 [ 2471.284577] ? fput_many+0x2f/0x1a0 [ 2471.284939] ? ksys_write+0x1a9/0x260 [ 2471.285317] ? __ia32_sys_read+0xb0/0xb0 [ 2471.285722] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2471.286254] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2471.286773] ? trace_hardirqs_on+0x5b/0x180 [ 2471.287225] do_syscall_64+0x33/0x40 [ 2471.287591] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2471.288098] RIP: 0033:0x7f7f3dd15b19 [ 2471.288469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2471.290223] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2471.290961] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2471.291658] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2471.292343] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2471.293035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2471.293757] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:33:02 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 69) [ 2471.435710] FAULT_INJECTION: forcing a failure. [ 2471.435710] name failslab, interval 1, probability 0, space 0, times 0 [ 2471.436918] CPU: 1 PID: 43981 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2471.437595] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2471.438405] Call Trace: [ 2471.438670] dump_stack+0x107/0x167 [ 2471.439033] should_fail.cold+0x5/0xa [ 2471.439419] ? create_object.isra.0+0x3a/0xa20 [ 2471.439870] should_failslab+0x5/0x20 [ 2471.440248] kmem_cache_alloc+0x5b/0x310 [ 2471.440650] create_object.isra.0+0x3a/0xa20 [ 2471.441086] kmemleak_alloc_percpu+0xa0/0x100 [ 2471.441525] pcpu_alloc+0x4e2/0x1240 [ 2471.441901] alloc_vfsmnt+0xfd/0x680 [ 2471.442267] clone_mnt+0x6c/0xce0 [ 2471.442624] copy_tree+0x3b0/0xa60 [ 2471.442981] copy_mnt_ns+0x144/0xa00 [ 2471.443353] ? kmem_cache_alloc+0x2a6/0x310 [ 2471.443783] create_new_namespaces+0xd6/0xb20 [ 2471.444228] copy_namespaces+0x3fb/0x4f0 [ 2471.444630] copy_process+0x385b/0x7800 [ 2471.445020] ? mark_lock+0xf5/0x2df0 [ 2471.445391] ? lock_acquire+0x197/0x470 [ 2471.445796] ? __cleanup_sighand+0xb0/0xb0 [ 2471.446220] ? _copy_from_user+0xfb/0x1b0 [ 2471.446631] kernel_clone+0xe7/0x980 [ 2471.446999] ? lock_acquire+0x197/0x470 [ 2471.447402] ? create_io_thread+0xf0/0xf0 [ 2471.447817] ? ksys_write+0x21a/0x260 [ 2471.448194] ? lock_downgrade+0x6d0/0x6d0 [ 2471.448608] __do_sys_clone3+0x1e5/0x320 [ 2471.449006] ? __do_sys_clone+0x110/0x110 [ 2471.449428] ? rcu_read_lock_any_held+0x75/0xa0 [ 2471.449882] ? vfs_write+0x354/0xa70 [ 2471.450247] ? fput_many+0x2f/0x1a0 [ 2471.450604] ? ksys_write+0x1a9/0x260 [ 2471.450977] ? __ia32_sys_read+0xb0/0xb0 [ 2471.451385] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2471.451900] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2471.452402] ? trace_hardirqs_on+0x5b/0x180 [ 2471.452828] do_syscall_64+0x33/0x40 [ 2471.453192] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2471.453693] RIP: 0033:0x7f3d2b989b19 [ 2471.454060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2471.455851] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2471.456591] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2471.457282] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2471.457970] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2471.458659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2471.459361] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:02 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r3, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x4, 0x0, r2, 0x0, &(0x7f0000000180), 0x0, 0x10002, 0x0, {0x0, r4}}, 0x637) 08:33:02 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) r2 = syz_open_dev$mouse(&(0x7f0000000180), 0x8, 0x300) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f00000001c0)={r2}) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) r3 = syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FITRIM(r3, 0xc0185879, &(0x7f00000002c0)={0x4, 0x2, 0x8}) r5 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={r5, 0x4}) setsockopt$bt_BT_DEFER_SETUP(r6, 0x112, 0x7, &(0x7f0000000340)=0x1, 0x4) syz_io_uring_setup(0x2311, &(0x7f00000000c0)={0x0, 0x9685, 0x7, 0xfffffffd, 0x93}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000280)) 08:33:18 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c", 0x13, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:18 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 69) 08:33:18 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r3) r4 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r4]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r5) r6 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r6]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:33:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:33:18 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {0x0, 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2487.505233] FAULT_INJECTION: forcing a failure. [ 2487.505233] name failslab, interval 1, probability 0, space 0, times 0 [ 2487.506432] CPU: 1 PID: 44006 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2487.507035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2487.507717] Call Trace: [ 2487.507957] dump_stack+0x107/0x167 [ 2487.508265] should_fail.cold+0x5/0xa [ 2487.508591] ? create_object.isra.0+0x3a/0xa20 [ 2487.508997] should_failslab+0x5/0x20 [ 2487.509315] kmem_cache_alloc+0x5b/0x310 [ 2487.509655] create_object.isra.0+0x3a/0xa20 [ 2487.510026] kmemleak_alloc_percpu+0xa0/0x100 [ 2487.510398] pcpu_alloc+0x4e2/0x1240 [ 2487.510714] alloc_vfsmnt+0xfd/0x680 [ 2487.511037] clone_mnt+0x6c/0xce0 [ 2487.511331] copy_tree+0x3b0/0xa60 [ 2487.511639] copy_mnt_ns+0x144/0xa00 [ 2487.511959] ? kmem_cache_alloc+0x2a6/0x310 [ 2487.512325] create_new_namespaces+0xd6/0xb20 [ 2487.512701] copy_namespaces+0x3fb/0x4f0 [ 2487.513058] copy_process+0x385b/0x7800 [ 2487.513390] ? mark_lock+0xf5/0x2df0 [ 2487.513706] ? lock_acquire+0x197/0x470 [ 2487.514048] ? __cleanup_sighand+0xb0/0xb0 [ 2487.514412] ? _copy_from_user+0xfb/0x1b0 [ 2487.514768] kernel_clone+0xe7/0x980 [ 2487.515088] ? lock_acquire+0x197/0x470 [ 2487.515436] ? create_io_thread+0xf0/0xf0 [ 2487.515790] ? ksys_write+0x21a/0x260 [ 2487.516120] ? lock_downgrade+0x6d0/0x6d0 [ 2487.516463] __do_sys_clone3+0x1e5/0x320 [ 2487.516811] ? __do_sys_clone+0x110/0x110 [ 2487.517181] ? rcu_read_lock_any_held+0x75/0xa0 [ 2487.517582] ? vfs_write+0x354/0xa70 [ 2487.517905] ? fput_many+0x2f/0x1a0 [ 2487.518213] ? ksys_write+0x1a9/0x260 [ 2487.518540] ? __ia32_sys_read+0xb0/0xb0 [ 2487.518893] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2487.519333] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2487.519780] ? trace_hardirqs_on+0x5b/0x180 [ 2487.520153] do_syscall_64+0x33/0x40 [ 2487.520462] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2487.520901] RIP: 0033:0x7f7f3dd15b19 [ 2487.521231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2487.522783] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2487.523444] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2487.524066] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2487.524575] 9pnet: Insufficient options for proto=fd [ 2487.524776] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2487.526292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2487.527021] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2487.545930] FAULT_INJECTION: forcing a failure. [ 2487.545930] name failslab, interval 1, probability 0, space 0, times 0 [ 2487.547581] CPU: 0 PID: 44011 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2487.548560] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2487.549726] Call Trace: [ 2487.550108] dump_stack+0x107/0x167 [ 2487.550622] should_fail.cold+0x5/0xa [ 2487.551176] ? create_object.isra.0+0x3a/0xa20 [ 2487.551832] should_failslab+0x5/0x20 [ 2487.552372] kmem_cache_alloc+0x5b/0x310 [ 2487.552945] ? mark_held_locks+0x9e/0xe0 [ 2487.553520] create_object.isra.0+0x3a/0xa20 [ 2487.554155] kmemleak_alloc_percpu+0xa0/0x100 [ 2487.554803] pcpu_alloc+0x4e2/0x1240 [ 2487.555528] alloc_vfsmnt+0xfd/0x680 [ 2487.556069] clone_mnt+0x6c/0xce0 [ 2487.556564] copy_tree+0x3b0/0xa60 [ 2487.557085] copy_mnt_ns+0x144/0xa00 [ 2487.557607] ? kmem_cache_alloc+0x2a6/0x310 [ 2487.558230] create_new_namespaces+0xd6/0xb20 [ 2487.558871] copy_namespaces+0x3fb/0x4f0 [ 2487.559454] copy_process+0x385b/0x7800 [ 2487.560028] ? mark_lock+0xf5/0x2df0 [ 2487.560570] ? lock_acquire+0x197/0x470 [ 2487.561154] ? __cleanup_sighand+0xb0/0xb0 [ 2487.561770] ? _copy_from_user+0xfb/0x1b0 [ 2487.562374] kernel_clone+0xe7/0x980 [ 2487.562904] ? lock_acquire+0x197/0x470 [ 2487.563484] ? create_io_thread+0xf0/0xf0 [ 2487.564083] ? ksys_write+0x21a/0x260 [ 2487.564629] ? lock_downgrade+0x6d0/0x6d0 [ 2487.565222] __do_sys_clone3+0x1e5/0x320 [ 2487.565800] ? __do_sys_clone+0x110/0x110 [ 2487.566405] ? rcu_read_lock_any_held+0x75/0xa0 [ 2487.567064] ? vfs_write+0x354/0xa70 [ 2487.567604] ? fput_many+0x2f/0x1a0 [ 2487.568123] ? ksys_write+0x1a9/0x260 [ 2487.568667] ? __ia32_sys_read+0xb0/0xb0 [ 2487.569252] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2487.569998] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2487.570724] ? trace_hardirqs_on+0x5b/0x180 [ 2487.571344] do_syscall_64+0x33/0x40 [ 2487.571883] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2487.572605] RIP: 0033:0x7f3d2b989b19 [ 2487.573144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2487.575730] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2487.576815] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2487.577828] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2487.578836] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2487.579860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2487.580871] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:18 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0), 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:33:18 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 70) 08:33:18 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 71) [ 2487.786122] FAULT_INJECTION: forcing a failure. [ 2487.786122] name failslab, interval 1, probability 0, space 0, times 0 08:33:18 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 70) [ 2487.788094] CPU: 0 PID: 44034 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2487.789379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2487.790702] Call Trace: [ 2487.791132] dump_stack+0x107/0x167 [ 2487.791729] should_fail.cold+0x5/0xa [ 2487.792347] ? alloc_vfsmnt+0x23/0x680 [ 2487.792980] should_failslab+0x5/0x20 [ 2487.793591] kmem_cache_alloc+0x5b/0x310 [ 2487.794243] ? copy_tree+0x61a/0xa60 [ 2487.794847] alloc_vfsmnt+0x23/0x680 [ 2487.795456] clone_mnt+0x6c/0xce0 [ 2487.796023] copy_tree+0x3b0/0xa60 [ 2487.796608] copy_mnt_ns+0x144/0xa00 [ 2487.797208] ? kmem_cache_alloc+0x2a6/0x310 [ 2487.797907] create_new_namespaces+0xd6/0xb20 [ 2487.798634] copy_namespaces+0x3fb/0x4f0 [ 2487.799293] copy_process+0x385b/0x7800 [ 2487.799950] ? mark_lock+0xf5/0x2df0 [ 2487.800552] ? lock_acquire+0x197/0x470 [ 2487.801207] ? __cleanup_sighand+0xb0/0xb0 [ 2487.801901] ? _copy_from_user+0xfb/0x1b0 [ 2487.802573] kernel_clone+0xe7/0x980 [ 2487.803173] ? lock_acquire+0x197/0x470 [ 2487.803819] ? create_io_thread+0xf0/0xf0 [ 2487.804499] ? ksys_write+0x21a/0x260 [ 2487.805111] ? lock_downgrade+0x6d0/0x6d0 [ 2487.805782] __do_sys_clone3+0x1e5/0x320 [ 2487.806431] ? __do_sys_clone+0x110/0x110 [ 2487.807112] ? rcu_read_lock_any_held+0x75/0xa0 [ 2487.807861] ? vfs_write+0x354/0xa70 [ 2487.808460] ? fput_many+0x2f/0x1a0 [ 2487.809046] ? ksys_write+0x1a9/0x260 [ 2487.809657] ? __ia32_sys_read+0xb0/0xb0 [ 2487.810314] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2487.811151] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2487.811975] ? trace_hardirqs_on+0x5b/0x180 [ 2487.812670] do_syscall_64+0x33/0x40 [ 2487.813263] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2487.814078] RIP: 0033:0x7f3d2b989b19 [ 2487.814677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2487.817600] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2487.818816] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2487.819954] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2487.821084] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2487.822214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2487.823341] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2487.875221] FAULT_INJECTION: forcing a failure. [ 2487.875221] name failslab, interval 1, probability 0, space 0, times 0 [ 2487.876346] CPU: 1 PID: 44036 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2487.876943] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2487.877634] Call Trace: [ 2487.877875] dump_stack+0x107/0x167 [ 2487.878184] should_fail.cold+0x5/0xa [ 2487.878495] ? create_object.isra.0+0x3a/0xa20 [ 2487.878887] should_failslab+0x5/0x20 [ 2487.879202] kmem_cache_alloc+0x5b/0x310 [ 2487.879539] ? mark_held_locks+0x9e/0xe0 [ 2487.879895] create_object.isra.0+0x3a/0xa20 [ 2487.880274] kmemleak_alloc_percpu+0xa0/0x100 [ 2487.880648] pcpu_alloc+0x4e2/0x1240 [ 2487.880982] alloc_vfsmnt+0xfd/0x680 [ 2487.881295] clone_mnt+0x6c/0xce0 [ 2487.881588] copy_tree+0x3b0/0xa60 [ 2487.881899] copy_mnt_ns+0x144/0xa00 [ 2487.882206] ? kmem_cache_alloc+0x2a6/0x310 [ 2487.882579] create_new_namespaces+0xd6/0xb20 [ 2487.882977] copy_namespaces+0x3fb/0x4f0 [ 2487.883319] copy_process+0x385b/0x7800 [ 2487.883672] ? mark_lock+0xf5/0x2df0 [ 2487.883983] ? lock_acquire+0x197/0x470 [ 2487.884321] ? __cleanup_sighand+0xb0/0xb0 [ 2487.884672] ? _copy_from_user+0xfb/0x1b0 [ 2487.885044] kernel_clone+0xe7/0x980 [ 2487.885359] ? lock_acquire+0x197/0x470 [ 2487.885679] ? create_io_thread+0xf0/0xf0 [ 2487.886043] ? ksys_write+0x21a/0x260 [ 2487.886359] ? lock_downgrade+0x6d0/0x6d0 [ 2487.886718] __do_sys_clone3+0x1e5/0x320 [ 2487.887056] ? __do_sys_clone+0x110/0x110 [ 2487.887429] ? rcu_read_lock_any_held+0x75/0xa0 [ 2487.887830] ? vfs_write+0x354/0xa70 [ 2487.888137] ? fput_many+0x2f/0x1a0 [ 2487.888430] ? ksys_write+0x1a9/0x260 [ 2487.888753] ? __ia32_sys_read+0xb0/0xb0 [ 2487.889109] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2487.889545] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2487.889968] ? trace_hardirqs_on+0x5b/0x180 [ 2487.890332] do_syscall_64+0x33/0x40 [ 2487.890651] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2487.891072] RIP: 0033:0x7f7f3dd15b19 [ 2487.891394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2487.892859] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2487.893487] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2487.894093] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2487.894688] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2487.895289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2487.895898] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:33:18 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 72) [ 2487.936652] FAULT_INJECTION: forcing a failure. [ 2487.936652] name failslab, interval 1, probability 0, space 0, times 0 [ 2487.938615] CPU: 0 PID: 44038 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2487.939740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2487.941068] Call Trace: [ 2487.941504] dump_stack+0x107/0x167 [ 2487.942094] should_fail.cold+0x5/0xa [ 2487.942715] ? alloc_vfsmnt+0x23/0x680 [ 2487.943347] should_failslab+0x5/0x20 [ 2487.943976] kmem_cache_alloc+0x5b/0x310 [ 2487.944634] ? copy_tree+0x61a/0xa60 [ 2487.945243] alloc_vfsmnt+0x23/0x680 [ 2487.945851] clone_mnt+0x6c/0xce0 [ 2487.946421] copy_tree+0x3b0/0xa60 [ 2487.947009] copy_mnt_ns+0x144/0xa00 [ 2487.947622] ? kmem_cache_alloc+0x2a6/0x310 [ 2487.948330] create_new_namespaces+0xd6/0xb20 [ 2487.949062] copy_namespaces+0x3fb/0x4f0 [ 2487.949725] copy_process+0x385b/0x7800 [ 2487.950372] ? mark_lock+0xf5/0x2df0 [ 2487.950984] ? lock_acquire+0x197/0x470 [ 2487.951648] ? __cleanup_sighand+0xb0/0xb0 [ 2487.952347] ? _copy_from_user+0xfb/0x1b0 [ 2487.953023] kernel_clone+0xe7/0x980 [ 2487.953626] ? lock_acquire+0x197/0x470 [ 2487.954271] ? create_io_thread+0xf0/0xf0 [ 2487.954959] ? ksys_write+0x21a/0x260 [ 2487.955585] ? lock_downgrade+0x6d0/0x6d0 [ 2487.956261] __do_sys_clone3+0x1e5/0x320 [ 2487.956916] ? __do_sys_clone+0x110/0x110 [ 2487.957606] ? rcu_read_lock_any_held+0x75/0xa0 [ 2487.958359] ? vfs_write+0x354/0xa70 [ 2487.958961] ? fput_many+0x2f/0x1a0 [ 2487.959565] ? ksys_write+0x1a9/0x260 [ 2487.960184] ? __ia32_sys_read+0xb0/0xb0 [ 2487.960848] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2487.961691] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2487.962520] ? trace_hardirqs_on+0x5b/0x180 [ 2487.963195] do_syscall_64+0x33/0x40 [ 2487.963805] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2487.964632] RIP: 0033:0x7f3d2b989b19 [ 2487.965238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2487.968201] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2487.969431] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2487.970577] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2487.971732] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2487.972878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2487.974030] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:19 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 73) [ 2488.035974] FAULT_INJECTION: forcing a failure. [ 2488.035974] name failslab, interval 1, probability 0, space 0, times 0 [ 2488.037193] CPU: 1 PID: 44040 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2488.037910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2488.038756] Call Trace: [ 2488.039042] dump_stack+0x107/0x167 [ 2488.039437] should_fail.cold+0x5/0xa [ 2488.039846] should_failslab+0x5/0x20 [ 2488.040220] __kmalloc_track_caller+0x79/0x370 [ 2488.040597] ? kstrdup_const+0x53/0x80 [ 2488.040934] kstrdup+0x36/0x70 [ 2488.041204] kstrdup_const+0x53/0x80 [ 2488.041514] alloc_vfsmnt+0xb5/0x680 [ 2488.041837] clone_mnt+0x6c/0xce0 [ 2488.042136] copy_tree+0x3b0/0xa60 [ 2488.042440] copy_mnt_ns+0x144/0xa00 [ 2488.042751] ? kmem_cache_alloc+0x2a6/0x310 [ 2488.043122] create_new_namespaces+0xd6/0xb20 [ 2488.043512] copy_namespaces+0x3fb/0x4f0 [ 2488.043867] copy_process+0x385b/0x7800 [ 2488.044198] ? mark_lock+0xf5/0x2df0 [ 2488.044516] ? lock_acquire+0x197/0x470 [ 2488.044866] ? __cleanup_sighand+0xb0/0xb0 [ 2488.045225] ? _copy_from_user+0xfb/0x1b0 [ 2488.045568] kernel_clone+0xe7/0x980 [ 2488.045889] ? lock_acquire+0x197/0x470 [ 2488.046219] ? create_io_thread+0xf0/0xf0 [ 2488.046567] ? ksys_write+0x21a/0x260 [ 2488.046901] ? lock_downgrade+0x6d0/0x6d0 [ 2488.047243] __do_sys_clone3+0x1e5/0x320 [ 2488.047589] ? __do_sys_clone+0x110/0x110 [ 2488.047957] ? rcu_read_lock_any_held+0x75/0xa0 [ 2488.048335] ? vfs_write+0x354/0xa70 [ 2488.048648] ? fput_many+0x2f/0x1a0 [ 2488.048968] ? ksys_write+0x1a9/0x260 [ 2488.049286] ? __ia32_sys_read+0xb0/0xb0 [ 2488.049633] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2488.050078] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2488.050498] ? trace_hardirqs_on+0x5b/0x180 [ 2488.050863] do_syscall_64+0x33/0x40 [ 2488.051173] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2488.051601] RIP: 0033:0x7f3d2b989b19 [ 2488.051930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2488.053449] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2488.054086] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2488.054681] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2488.055303] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2488.055910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2488.056503] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:19 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 74) [ 2488.157518] FAULT_INJECTION: forcing a failure. [ 2488.157518] name failslab, interval 1, probability 0, space 0, times 0 [ 2488.159217] CPU: 0 PID: 44042 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2488.160215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2488.161394] Call Trace: [ 2488.161776] dump_stack+0x107/0x167 [ 2488.162293] should_fail.cold+0x5/0xa [ 2488.162838] ? create_object.isra.0+0x3a/0xa20 [ 2488.163495] should_failslab+0x5/0x20 [ 2488.164039] kmem_cache_alloc+0x5b/0x310 [ 2488.164624] create_object.isra.0+0x3a/0xa20 [ 2488.165252] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2488.165972] __kmalloc_track_caller+0x177/0x370 [ 2488.166629] ? kstrdup_const+0x53/0x80 [ 2488.167192] kstrdup+0x36/0x70 [ 2488.167664] kstrdup_const+0x53/0x80 [ 2488.168195] alloc_vfsmnt+0xb5/0x680 [ 2488.168728] clone_mnt+0x6c/0xce0 [ 2488.169233] copy_tree+0x3b0/0xa60 [ 2488.169747] copy_mnt_ns+0x144/0xa00 [ 2488.170278] ? kmem_cache_alloc+0x2a6/0x310 [ 2488.170900] create_new_namespaces+0xd6/0xb20 [ 2488.171553] copy_namespaces+0x3fb/0x4f0 [ 2488.172134] copy_process+0x385b/0x7800 [ 2488.172700] ? mark_lock+0xf5/0x2df0 [ 2488.173235] ? lock_acquire+0x197/0x470 [ 2488.173814] ? __cleanup_sighand+0xb0/0xb0 [ 2488.174428] ? _copy_from_user+0xfb/0x1b0 [ 2488.175024] kernel_clone+0xe7/0x980 [ 2488.175559] ? lock_acquire+0x197/0x470 [ 2488.176126] ? create_io_thread+0xf0/0xf0 [ 2488.176725] ? ksys_write+0x21a/0x260 [ 2488.177272] ? lock_downgrade+0x6d0/0x6d0 [ 2488.177867] __do_sys_clone3+0x1e5/0x320 [ 2488.178443] ? __do_sys_clone+0x110/0x110 [ 2488.179047] ? rcu_read_lock_any_held+0x75/0xa0 [ 2488.179709] ? vfs_write+0x354/0xa70 [ 2488.180235] ? fput_many+0x2f/0x1a0 [ 2488.180750] ? ksys_write+0x1a9/0x260 [ 2488.181293] ? __ia32_sys_read+0xb0/0xb0 [ 2488.181876] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2488.182619] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2488.183345] ? trace_hardirqs_on+0x5b/0x180 [ 2488.183967] do_syscall_64+0x33/0x40 [ 2488.184490] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2488.185221] RIP: 0033:0x7f3d2b989b19 [ 2488.185739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2488.188336] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2488.189428] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2488.190434] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2488.191447] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2488.192456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2488.193467] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:19 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0), 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:19 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2488.340163] 9pnet: Insufficient options for proto=fd 08:33:19 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 71) [ 2488.371181] FAULT_INJECTION: forcing a failure. [ 2488.371181] name failslab, interval 1, probability 0, space 0, times 0 [ 2488.372377] CPU: 1 PID: 44052 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2488.372952] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2488.373619] Call Trace: [ 2488.373847] dump_stack+0x107/0x167 [ 2488.374142] should_fail.cold+0x5/0xa [ 2488.374452] ? alloc_vfsmnt+0x23/0x680 [ 2488.374767] ? alloc_vfsmnt+0x23/0x680 [ 2488.375093] should_failslab+0x5/0x20 [ 2488.375411] kmem_cache_alloc+0x5b/0x310 [ 2488.375745] ? trace_hardirqs_on+0x5b/0x180 [ 2488.376101] alloc_vfsmnt+0x23/0x680 [ 2488.376408] clone_mnt+0x6c/0xce0 [ 2488.376691] ? copy_tree+0x3a1/0xa60 [ 2488.377009] copy_tree+0x3b0/0xa60 [ 2488.377300] copy_mnt_ns+0x144/0xa00 [ 2488.377600] ? kmem_cache_alloc+0x2a6/0x310 [ 2488.377954] create_new_namespaces+0xd6/0xb20 [ 2488.378320] copy_namespaces+0x3fb/0x4f0 [ 2488.378659] copy_process+0x385b/0x7800 [ 2488.378991] ? mark_lock+0xf5/0x2df0 [ 2488.379292] ? lock_acquire+0x197/0x470 [ 2488.379631] ? __cleanup_sighand+0xb0/0xb0 [ 2488.379990] ? _copy_from_user+0xfb/0x1b0 [ 2488.380328] kernel_clone+0xe7/0x980 [ 2488.380629] ? lock_acquire+0x197/0x470 [ 2488.380960] ? create_io_thread+0xf0/0xf0 [ 2488.381309] ? ksys_write+0x21a/0x260 [ 2488.381615] ? lock_downgrade+0x6d0/0x6d0 [ 2488.381958] __do_sys_clone3+0x1e5/0x320 [ 2488.382284] ? __do_sys_clone+0x110/0x110 [ 2488.382630] ? rcu_read_lock_any_held+0x75/0xa0 [ 2488.383009] ? vfs_write+0x354/0xa70 [ 2488.383311] ? fput_many+0x2f/0x1a0 [ 2488.383614] ? ksys_write+0x1a9/0x260 [ 2488.383929] ? __ia32_sys_read+0xb0/0xb0 [ 2488.384256] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2488.384676] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2488.385105] ? trace_hardirqs_on+0x5b/0x180 [ 2488.385459] do_syscall_64+0x33/0x40 [ 2488.385756] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2488.386182] RIP: 0033:0x7f7f3dd15b19 [ 2488.386483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2488.387981] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2488.388584] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2488.389163] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2488.389735] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2488.390307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2488.390884] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:33:35 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 75) 08:33:35 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:35 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0), 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:35 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0), 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:33:35 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 72) 08:33:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:33:35 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000180)={0x1f, 0x0, @any, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 2504.323483] FAULT_INJECTION: forcing a failure. [ 2504.323483] name failslab, interval 1, probability 0, space 0, times 0 [ 2504.324709] CPU: 1 PID: 44073 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2504.325406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2504.326233] Call Trace: [ 2504.326502] dump_stack+0x107/0x167 [ 2504.326868] should_fail.cold+0x5/0xa [ 2504.327256] ? create_object.isra.0+0x3a/0xa20 [ 2504.327726] should_failslab+0x5/0x20 [ 2504.328110] kmem_cache_alloc+0x5b/0x310 [ 2504.328534] create_object.isra.0+0x3a/0xa20 [ 2504.328980] kmemleak_alloc_percpu+0xa0/0x100 [ 2504.329434] pcpu_alloc+0x4e2/0x1240 [ 2504.329826] alloc_vfsmnt+0xfd/0x680 [ 2504.330207] clone_mnt+0x6c/0xce0 [ 2504.330572] copy_tree+0x3b0/0xa60 [ 2504.330940] copy_mnt_ns+0x144/0xa00 [ 2504.331322] ? kmem_cache_alloc+0x2a6/0x310 [ 2504.331754] create_new_namespaces+0xd6/0xb20 [ 2504.332220] copy_namespaces+0x3fb/0x4f0 [ 2504.332626] copy_process+0x385b/0x7800 [ 2504.333028] ? mark_lock+0xf5/0x2df0 [ 2504.333406] ? lock_acquire+0x197/0x470 [ 2504.333812] ? __cleanup_sighand+0xb0/0xb0 [ 2504.334244] ? _copy_from_user+0xfb/0x1b0 [ 2504.334664] kernel_clone+0xe7/0x980 [ 2504.335050] ? lock_acquire+0x197/0x470 [ 2504.335449] ? create_io_thread+0xf0/0xf0 [ 2504.335881] ? ksys_write+0x21a/0x260 [ 2504.336262] ? lock_downgrade+0x6d0/0x6d0 [ 2504.336676] __do_sys_clone3+0x1e5/0x320 [ 2504.337083] ? __do_sys_clone+0x110/0x110 [ 2504.337499] ? rcu_read_lock_any_held+0x75/0xa0 [ 2504.337967] ? vfs_write+0x354/0xa70 [ 2504.338330] ? fput_many+0x2f/0x1a0 [ 2504.338701] ? ksys_write+0x1a9/0x260 [ 2504.339087] ? __ia32_sys_read+0xb0/0xb0 [ 2504.339498] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2504.340042] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2504.340556] ? trace_hardirqs_on+0x5b/0x180 [ 2504.340982] do_syscall_64+0x33/0x40 [ 2504.341364] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2504.341868] RIP: 0033:0x7f3d2b989b19 [ 2504.342243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2504.344072] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2504.344829] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2504.345523] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2504.346249] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2504.346931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2504.347656] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2504.377506] FAULT_INJECTION: forcing a failure. [ 2504.377506] name failslab, interval 1, probability 0, space 0, times 0 [ 2504.378720] CPU: 1 PID: 44079 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2504.379404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2504.380218] Call Trace: [ 2504.380480] dump_stack+0x107/0x167 [ 2504.380839] should_fail.cold+0x5/0xa [ 2504.381202] ? create_object.isra.0+0x3a/0xa20 [ 2504.381655] should_failslab+0x5/0x20 [ 2504.382030] kmem_cache_alloc+0x5b/0x310 [ 2504.382420] create_object.isra.0+0x3a/0xa20 [ 2504.382852] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2504.383334] kmem_cache_alloc+0x159/0x310 [ 2504.383754] alloc_vfsmnt+0x23/0x680 [ 2504.384137] clone_mnt+0x6c/0xce0 [ 2504.384489] copy_tree+0x3b0/0xa60 [ 2504.384853] copy_mnt_ns+0x144/0xa00 [ 2504.385223] ? kmem_cache_alloc+0x2a6/0x310 [ 2504.385655] create_new_namespaces+0xd6/0xb20 [ 2504.386096] copy_namespaces+0x3fb/0x4f0 [ 2504.386499] copy_process+0x385b/0x7800 [ 2504.386893] ? lock_acquire+0x1b9/0x470 [ 2504.387291] ? __cleanup_sighand+0xb0/0xb0 [ 2504.387707] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2504.388293] ? trace_hardirqs_on+0x5b/0x180 [ 2504.388750] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2504.389287] ? kernel_clone+0x305/0x980 [ 2504.389688] ? kernel_clone+0xd5/0x980 [ 2504.390060] kernel_clone+0xe7/0x980 [ 2504.390427] ? create_io_thread+0xf0/0xf0 [ 2504.390843] ? lock_downgrade+0x6d0/0x6d0 [ 2504.391257] ? enqueue_hrtimer+0x177/0x2e0 [ 2504.391704] __do_sys_clone3+0x1e5/0x320 [ 2504.392105] ? __do_sys_clone+0x110/0x110 [ 2504.392513] ? recalibrate_cpu_khz+0x10/0x10 [ 2504.392949] ? tick_program_event+0xa8/0x140 [ 2504.393380] ? hrtimer_interrupt+0x771/0x9b0 [ 2504.393828] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2504.394340] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2504.394850] ? trace_hardirqs_on+0x5b/0x180 [ 2504.395257] do_syscall_64+0x33/0x40 [ 2504.395627] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2504.396112] RIP: 0033:0x7f7f3dd15b19 [ 2504.396485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2504.398234] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2504.398968] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2504.399640] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2504.400331] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2504.401013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2504.401691] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:33:35 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 76) [ 2504.623382] FAULT_INJECTION: forcing a failure. [ 2504.623382] name failslab, interval 1, probability 0, space 0, times 0 [ 2504.624697] CPU: 1 PID: 44097 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2504.625273] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2504.625963] Call Trace: [ 2504.626194] dump_stack+0x107/0x167 [ 2504.626503] should_fail.cold+0x5/0xa [ 2504.626827] ? create_object.isra.0+0x3a/0xa20 [ 2504.627226] should_failslab+0x5/0x20 [ 2504.627544] kmem_cache_alloc+0x5b/0x310 [ 2504.627898] ? mark_held_locks+0x9e/0xe0 [ 2504.628248] create_object.isra.0+0x3a/0xa20 [ 2504.628621] kmemleak_alloc_percpu+0xa0/0x100 [ 2504.629002] pcpu_alloc+0x4e2/0x1240 [ 2504.629327] alloc_vfsmnt+0xfd/0x680 [ 2504.629646] clone_mnt+0x6c/0xce0 [ 2504.629942] copy_tree+0x3b0/0xa60 [ 2504.630248] copy_mnt_ns+0x144/0xa00 [ 2504.630561] ? kmem_cache_alloc+0x2a6/0x310 [ 2504.630932] create_new_namespaces+0xd6/0xb20 [ 2504.631314] copy_namespaces+0x3fb/0x4f0 [ 2504.631666] copy_process+0x385b/0x7800 [ 2504.632004] ? mark_lock+0xf5/0x2df0 [ 2504.632321] ? lock_acquire+0x197/0x470 [ 2504.632665] ? __cleanup_sighand+0xb0/0xb0 [ 2504.633031] ? _copy_from_user+0xfb/0x1b0 [ 2504.633387] kernel_clone+0xe7/0x980 [ 2504.633698] ? lock_acquire+0x197/0x470 [ 2504.634031] ? create_io_thread+0xf0/0xf0 [ 2504.634385] ? ksys_write+0x21a/0x260 [ 2504.634709] ? lock_downgrade+0x6d0/0x6d0 [ 2504.635057] __do_sys_clone3+0x1e5/0x320 [ 2504.635399] ? __do_sys_clone+0x110/0x110 [ 2504.635759] ? rcu_read_lock_any_held+0x75/0xa0 [ 2504.636143] ? vfs_write+0x354/0xa70 [ 2504.636460] ? fput_many+0x2f/0x1a0 [ 2504.636766] ? ksys_write+0x1a9/0x260 [ 2504.637083] ? __ia32_sys_read+0xb0/0xb0 [ 2504.637424] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2504.637862] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2504.638293] ? trace_hardirqs_on+0x5b/0x180 [ 2504.638658] do_syscall_64+0x33/0x40 [ 2504.638975] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2504.639413] RIP: 0033:0x7f3d2b989b19 [ 2504.639736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2504.641312] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2504.641948] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2504.642535] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2504.643235] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2504.643834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2504.644426] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:35 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 73) [ 2504.843280] FAULT_INJECTION: forcing a failure. [ 2504.843280] name failslab, interval 1, probability 0, space 0, times 0 [ 2504.844253] CPU: 1 PID: 44102 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2504.844813] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2504.845475] Call Trace: [ 2504.845696] dump_stack+0x107/0x167 [ 2504.845992] should_fail.cold+0x5/0xa [ 2504.846312] should_failslab+0x5/0x20 [ 2504.846623] __kmalloc_track_caller+0x79/0x370 [ 2504.847090] ? kstrdup_const+0x53/0x80 [ 2504.847541] kstrdup+0x36/0x70 [ 2504.847879] kstrdup_const+0x53/0x80 [ 2504.848181] alloc_vfsmnt+0xb5/0x680 [ 2504.848481] clone_mnt+0x6c/0xce0 [ 2504.848769] copy_tree+0x3b0/0xa60 [ 2504.849066] copy_mnt_ns+0x144/0xa00 [ 2504.849368] ? kmem_cache_alloc+0x2a6/0x310 [ 2504.849713] create_new_namespaces+0xd6/0xb20 [ 2504.850077] copy_namespaces+0x3fb/0x4f0 [ 2504.850415] copy_process+0x385b/0x7800 [ 2504.850738] ? mark_lock+0xf5/0x2df0 [ 2504.851047] ? lock_acquire+0x197/0x470 [ 2504.851371] ? __cleanup_sighand+0xb0/0xb0 [ 2504.851727] ? _copy_from_user+0xfb/0x1b0 [ 2504.852064] kernel_clone+0xe7/0x980 [ 2504.852369] ? lock_acquire+0x197/0x470 [ 2504.852692] ? create_io_thread+0xf0/0xf0 [ 2504.853035] ? ksys_write+0x21a/0x260 [ 2504.853340] ? lock_downgrade+0x6d0/0x6d0 [ 2504.853674] __do_sys_clone3+0x1e5/0x320 [ 2504.854001] ? __do_sys_clone+0x110/0x110 [ 2504.854346] ? rcu_read_lock_any_held+0x75/0xa0 [ 2504.854721] ? vfs_write+0x354/0xa70 [ 2504.855021] ? fput_many+0x2f/0x1a0 [ 2504.855317] ? ksys_write+0x1a9/0x260 [ 2504.855625] ? __ia32_sys_read+0xb0/0xb0 [ 2504.855956] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2504.856372] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2504.856782] ? trace_hardirqs_on+0x5b/0x180 [ 2504.857130] do_syscall_64+0x33/0x40 [ 2504.857429] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2504.857841] RIP: 0033:0x7f7f3dd15b19 [ 2504.858134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2504.859595] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2504.860203] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2504.860771] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2504.861331] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2504.861895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2504.862462] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:33:35 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 77) [ 2504.908574] FAULT_INJECTION: forcing a failure. [ 2504.908574] name failslab, interval 1, probability 0, space 0, times 0 [ 2504.909594] CPU: 1 PID: 44104 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2504.910152] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2504.910815] Call Trace: [ 2504.911036] dump_stack+0x107/0x167 [ 2504.911332] should_fail.cold+0x5/0xa [ 2504.911655] ? alloc_vfsmnt+0x23/0x680 [ 2504.912045] should_failslab+0x5/0x20 [ 2504.912427] kmem_cache_alloc+0x5b/0x310 [ 2504.912779] ? copy_tree+0x61a/0xa60 [ 2504.913084] alloc_vfsmnt+0x23/0x680 [ 2504.913385] clone_mnt+0x6c/0xce0 [ 2504.913676] copy_tree+0x3b0/0xa60 [ 2504.913971] copy_mnt_ns+0x144/0xa00 [ 2504.914271] ? kmem_cache_alloc+0x2a6/0x310 [ 2504.914623] create_new_namespaces+0xd6/0xb20 [ 2504.914988] copy_namespaces+0x3fb/0x4f0 [ 2504.915322] copy_process+0x385b/0x7800 [ 2504.915655] ? mark_lock+0xf5/0x2df0 [ 2504.915959] ? lock_acquire+0x197/0x470 [ 2504.916285] ? __cleanup_sighand+0xb0/0xb0 [ 2504.916636] ? _copy_from_user+0xfb/0x1b0 [ 2504.916973] kernel_clone+0xe7/0x980 [ 2504.917275] ? lock_acquire+0x197/0x470 [ 2504.917599] ? create_io_thread+0xf0/0xf0 [ 2504.917945] ? ksys_write+0x21a/0x260 [ 2504.918256] ? lock_downgrade+0x6d0/0x6d0 [ 2504.918643] __do_sys_clone3+0x1e5/0x320 [ 2504.918973] ? __do_sys_clone+0x110/0x110 [ 2504.919317] ? rcu_read_lock_any_held+0x75/0xa0 [ 2504.919707] ? vfs_write+0x354/0xa70 [ 2504.920029] ? fput_many+0x2f/0x1a0 [ 2504.920395] ? ksys_write+0x1a9/0x260 [ 2504.920787] ? __ia32_sys_read+0xb0/0xb0 [ 2504.921197] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2504.921631] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2504.922046] ? trace_hardirqs_on+0x5b/0x180 [ 2504.922403] do_syscall_64+0x33/0x40 [ 2504.922702] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2504.923115] RIP: 0033:0x7f3d2b989b19 [ 2504.923416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2504.924899] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2504.925507] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2504.926071] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2504.926637] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2504.927206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2504.927779] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:36 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0e9", 0x29, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:36 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 74) [ 2505.018381] FAULT_INJECTION: forcing a failure. [ 2505.018381] name failslab, interval 1, probability 0, space 0, times 0 [ 2505.020402] CPU: 0 PID: 44107 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2505.021466] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2505.022743] Call Trace: [ 2505.023164] dump_stack+0x107/0x167 [ 2505.023746] should_fail.cold+0x5/0xa [ 2505.024335] ? create_object.isra.0+0x3a/0xa20 [ 2505.025046] should_failslab+0x5/0x20 [ 2505.025635] kmem_cache_alloc+0x5b/0x310 [ 2505.026276] create_object.isra.0+0x3a/0xa20 [ 2505.026962] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2505.027760] __kmalloc_track_caller+0x177/0x370 [ 2505.028478] ? kstrdup_const+0x53/0x80 [ 2505.029093] kstrdup+0x36/0x70 [ 2505.029595] kstrdup_const+0x53/0x80 [ 2505.030177] alloc_vfsmnt+0xb5/0x680 [ 2505.030756] clone_mnt+0x6c/0xce0 [ 2505.031307] copy_tree+0x3b0/0xa60 [ 2505.031876] copy_mnt_ns+0x144/0xa00 [ 2505.032460] ? kmem_cache_alloc+0x2a6/0x310 [ 2505.033139] create_new_namespaces+0xd6/0xb20 [ 2505.033846] copy_namespaces+0x3fb/0x4f0 [ 2505.034477] copy_process+0x385b/0x7800 [ 2505.035099] ? mark_lock+0xf5/0x2df0 [ 2505.035695] ? lock_acquire+0x197/0x470 [ 2505.036331] ? __cleanup_sighand+0xb0/0xb0 [ 2505.037003] ? _copy_from_user+0xfb/0x1b0 [ 2505.037654] kernel_clone+0xe7/0x980 [ 2505.038239] ? lock_acquire+0x197/0x470 [ 2505.038853] ? create_io_thread+0xf0/0xf0 [ 2505.039507] ? ksys_write+0x21a/0x260 [ 2505.040105] ? lock_downgrade+0x6d0/0x6d0 [ 2505.040752] __do_sys_clone3+0x1e5/0x320 [ 2505.041384] ? __do_sys_clone+0x110/0x110 [ 2505.042054] ? rcu_read_lock_any_held+0x75/0xa0 [ 2505.042773] ? vfs_write+0x354/0xa70 [ 2505.043355] ? fput_many+0x2f/0x1a0 [ 2505.043931] ? ksys_write+0x1a9/0x260 [ 2505.044525] ? __ia32_sys_read+0xb0/0xb0 [ 2505.045162] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2505.045977] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2505.046772] ? trace_hardirqs_on+0x5b/0x180 [ 2505.047441] do_syscall_64+0x33/0x40 [ 2505.048031] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2505.048819] RIP: 0033:0x7f7f3dd15b19 [ 2505.049396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2505.052211] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2505.053381] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2505.054480] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2505.055586] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2505.056684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2505.057785] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:33:36 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb178", 0x15, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2506.381832] Bluetooth: hci7: command 0x0405 tx timeout 08:33:50 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 75) 08:33:50 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0), 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:50 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb178", 0x15, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:50 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2519.606186] FAULT_INJECTION: forcing a failure. [ 2519.606186] name failslab, interval 1, probability 0, space 0, times 0 [ 2519.607387] CPU: 0 PID: 44130 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2519.607999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2519.608748] Call Trace: [ 2519.608982] dump_stack+0x107/0x167 [ 2519.609296] should_fail.cold+0x5/0xa [ 2519.609667] ? create_object.isra.0+0x3a/0xa20 [ 2519.610138] should_failslab+0x5/0x20 [ 2519.610536] kmem_cache_alloc+0x5b/0x310 [ 2519.610929] create_object.isra.0+0x3a/0xa20 [ 2519.611304] kmemleak_alloc_percpu+0xa0/0x100 [ 2519.611725] pcpu_alloc+0x4e2/0x1240 [ 2519.612089] alloc_vfsmnt+0xfd/0x680 [ 2519.612425] clone_mnt+0x6c/0xce0 [ 2519.612754] copy_tree+0x3b0/0xa60 [ 2519.613094] copy_mnt_ns+0x144/0xa00 [ 2519.613426] ? kmem_cache_alloc+0x2a6/0x310 [ 2519.613819] create_new_namespaces+0xd6/0xb20 [ 2519.614237] copy_namespaces+0x3fb/0x4f0 [ 2519.614605] copy_process+0x385b/0x7800 [ 2519.614974] ? mark_lock+0xf5/0x2df0 [ 2519.615321] ? lock_acquire+0x197/0x470 [ 2519.615680] ? __cleanup_sighand+0xb0/0xb0 [ 2519.616092] ? _copy_from_user+0xfb/0x1b0 [ 2519.616480] kernel_clone+0xe7/0x980 [ 2519.616799] ? lock_acquire+0x197/0x470 [ 2519.617160] ? create_io_thread+0xf0/0xf0 [ 2519.617546] ? ksys_write+0x21a/0x260 [ 2519.617871] ? lock_downgrade+0x6d0/0x6d0 [ 2519.618248] __do_sys_clone3+0x1e5/0x320 [ 2519.618612] ? __do_sys_clone+0x110/0x110 [ 2519.618974] ? rcu_read_lock_any_held+0x75/0xa0 [ 2519.619401] ? vfs_write+0x354/0xa70 [ 2519.619751] ? fput_many+0x2f/0x1a0 [ 2519.620060] ? ksys_write+0x1a9/0x260 [ 2519.620414] ? __ia32_sys_read+0xb0/0xb0 [ 2519.620785] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2519.621229] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2519.621708] ? trace_hardirqs_on+0x5b/0x180 [ 2519.622080] do_syscall_64+0x33/0x40 [ 2519.622398] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2519.622872] RIP: 0033:0x7f7f3dd15b19 [ 2519.623192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2519.624787] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2519.625459] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2519.626101] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2519.626705] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2519.627348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2519.627984] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:33:50 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) readv(r3, &(0x7f0000000340)=[{&(0x7f0000000180)=""/113, 0x71}, {&(0x7f0000000200)=""/51, 0x33}, {&(0x7f0000000240)=""/198, 0xc6}], 0x3) 08:33:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:33:50 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 78) [ 2519.664159] FAULT_INJECTION: forcing a failure. [ 2519.664159] name failslab, interval 1, probability 0, space 0, times 0 [ 2519.665352] CPU: 1 PID: 44136 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2519.666033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2519.666845] Call Trace: [ 2519.667115] dump_stack+0x107/0x167 [ 2519.667485] should_fail.cold+0x5/0xa [ 2519.667878] ? create_object.isra.0+0x3a/0xa20 [ 2519.668327] should_failslab+0x5/0x20 [ 2519.668706] kmem_cache_alloc+0x5b/0x310 [ 2519.669115] create_object.isra.0+0x3a/0xa20 [ 2519.669546] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2519.670052] kmem_cache_alloc+0x159/0x310 [ 2519.670465] alloc_vfsmnt+0x23/0x680 [ 2519.670844] clone_mnt+0x6c/0xce0 [ 2519.671192] copy_tree+0x3b0/0xa60 [ 2519.671549] copy_mnt_ns+0x144/0xa00 [ 2519.671924] ? kmem_cache_alloc+0x2a6/0x310 [ 2519.672353] create_new_namespaces+0xd6/0xb20 [ 2519.672807] copy_namespaces+0x3fb/0x4f0 [ 2519.673214] copy_process+0x385b/0x7800 [ 2519.673609] ? mark_lock+0xf5/0x2df0 [ 2519.673982] ? lock_acquire+0x197/0x470 [ 2519.674384] ? __cleanup_sighand+0xb0/0xb0 [ 2519.674810] ? _copy_from_user+0xfb/0x1b0 [ 2519.675228] kernel_clone+0xe7/0x980 [ 2519.675594] ? lock_acquire+0x197/0x470 [ 2519.675996] ? create_io_thread+0xf0/0xf0 [ 2519.676413] ? ksys_write+0x21a/0x260 [ 2519.676795] ? lock_downgrade+0x6d0/0x6d0 [ 2519.677211] __do_sys_clone3+0x1e5/0x320 [ 2519.677612] ? __do_sys_clone+0x110/0x110 [ 2519.678033] ? rcu_read_lock_any_held+0x75/0xa0 [ 2519.678494] ? vfs_write+0x354/0xa70 [ 2519.678865] ? fput_many+0x2f/0x1a0 [ 2519.679226] ? ksys_write+0x1a9/0x260 [ 2519.679604] ? __ia32_sys_read+0xb0/0xb0 [ 2519.680013] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2519.680535] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2519.681041] ? trace_hardirqs_on+0x5b/0x180 [ 2519.681470] do_syscall_64+0x33/0x40 [ 2519.681836] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2519.682338] RIP: 0033:0x7f3d2b989b19 [ 2519.682716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2519.684507] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2519.685254] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2519.685953] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2519.686650] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2519.687350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2519.688053] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:50 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 76) [ 2519.808291] FAULT_INJECTION: forcing a failure. [ 2519.808291] name failslab, interval 1, probability 0, space 0, times 0 08:33:50 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 79) [ 2519.809675] CPU: 1 PID: 44158 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2519.810474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2519.811279] Call Trace: [ 2519.811547] dump_stack+0x107/0x167 [ 2519.811917] should_fail.cold+0x5/0xa [ 2519.812296] ? create_object.isra.0+0x3a/0xa20 [ 2519.812746] should_failslab+0x5/0x20 [ 2519.813121] kmem_cache_alloc+0x5b/0x310 [ 2519.813521] ? mark_held_locks+0x9e/0xe0 [ 2519.813929] create_object.isra.0+0x3a/0xa20 [ 2519.814370] kmemleak_alloc_percpu+0xa0/0x100 [ 2519.814813] pcpu_alloc+0x4e2/0x1240 [ 2519.815192] alloc_vfsmnt+0xfd/0x680 [ 2519.815560] clone_mnt+0x6c/0xce0 [ 2519.815920] copy_tree+0x3b0/0xa60 [ 2519.816281] copy_mnt_ns+0x144/0xa00 [ 2519.816649] ? kmem_cache_alloc+0x2a6/0x310 [ 2519.817082] create_new_namespaces+0xd6/0xb20 [ 2519.817522] copy_namespaces+0x3fb/0x4f0 [ 2519.817930] copy_process+0x385b/0x7800 [ 2519.818322] ? mark_lock+0xf5/0x2df0 [ 2519.818695] ? lock_acquire+0x197/0x470 [ 2519.819099] ? __cleanup_sighand+0xb0/0xb0 [ 2519.819521] ? _copy_from_user+0xfb/0x1b0 [ 2519.819943] kernel_clone+0xe7/0x980 [ 2519.820313] ? lock_acquire+0x197/0x470 [ 2519.820703] ? create_io_thread+0xf0/0xf0 [ 2519.821119] ? ksys_write+0x21a/0x260 [ 2519.821489] ? lock_downgrade+0x6d0/0x6d0 [ 2519.821904] __do_sys_clone3+0x1e5/0x320 [ 2519.822302] ? __do_sys_clone+0x110/0x110 [ 2519.822718] ? rcu_read_lock_any_held+0x75/0xa0 [ 2519.823172] ? vfs_write+0x354/0xa70 [ 2519.823537] ? fput_many+0x2f/0x1a0 [ 2519.823901] ? ksys_write+0x1a9/0x260 [ 2519.824272] ? __ia32_sys_read+0xb0/0xb0 [ 2519.824670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2519.825178] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2519.825686] ? trace_hardirqs_on+0x5b/0x180 [ 2519.826112] do_syscall_64+0x33/0x40 [ 2519.826475] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2519.826974] RIP: 0033:0x7f7f3dd15b19 [ 2519.827340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2519.829128] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2519.829874] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2519.830560] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2519.831264] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2519.831962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2519.832655] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2519.902589] FAULT_INJECTION: forcing a failure. [ 2519.902589] name failslab, interval 1, probability 0, space 0, times 0 [ 2519.903586] CPU: 0 PID: 44161 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2519.904138] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2519.904797] Call Trace: [ 2519.905015] dump_stack+0x107/0x167 [ 2519.905308] should_fail.cold+0x5/0xa [ 2519.905619] should_failslab+0x5/0x20 [ 2519.905927] __kmalloc_track_caller+0x79/0x370 [ 2519.906292] ? kstrdup_const+0x53/0x80 [ 2519.906605] kstrdup+0x36/0x70 [ 2519.906866] kstrdup_const+0x53/0x80 [ 2519.907171] alloc_vfsmnt+0xb5/0x680 [ 2519.907475] clone_mnt+0x6c/0xce0 [ 2519.907766] copy_tree+0x3b0/0xa60 [ 2519.908060] copy_mnt_ns+0x144/0xa00 [ 2519.908359] ? kmem_cache_alloc+0x2a6/0x310 [ 2519.908709] create_new_namespaces+0xd6/0xb20 [ 2519.909073] copy_namespaces+0x3fb/0x4f0 [ 2519.909398] copy_process+0x385b/0x7800 [ 2519.909723] ? mark_lock+0xf5/0x2df0 [ 2519.910025] ? lock_acquire+0x197/0x470 [ 2519.910353] ? __cleanup_sighand+0xb0/0xb0 [ 2519.910701] ? _copy_from_user+0xfb/0x1b0 [ 2519.911040] kernel_clone+0xe7/0x980 [ 2519.911339] ? lock_acquire+0x197/0x470 [ 2519.911658] ? create_io_thread+0xf0/0xf0 [ 2519.912002] ? ksys_write+0x21a/0x260 [ 2519.912307] ? lock_downgrade+0x6d0/0x6d0 [ 2519.912637] __do_sys_clone3+0x1e5/0x320 [ 2519.912959] ? __do_sys_clone+0x110/0x110 [ 2519.913298] ? rcu_read_lock_any_held+0x75/0xa0 [ 2519.913667] ? vfs_write+0x354/0xa70 [ 2519.913971] ? fput_many+0x2f/0x1a0 [ 2519.914263] ? ksys_write+0x1a9/0x260 [ 2519.914565] ? __ia32_sys_read+0xb0/0xb0 [ 2519.914894] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2519.915315] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2519.915725] ? trace_hardirqs_on+0x5b/0x180 [ 2519.916080] do_syscall_64+0x33/0x40 [ 2519.916377] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2519.916784] RIP: 0033:0x7f3d2b989b19 [ 2519.917087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2519.918529] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2519.919137] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2519.919704] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2519.920269] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2519.920833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2519.921397] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:51 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 80) [ 2520.053447] FAULT_INJECTION: forcing a failure. [ 2520.053447] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.054429] CPU: 0 PID: 44164 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2520.055017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2520.055679] Call Trace: [ 2520.055906] dump_stack+0x107/0x167 [ 2520.056197] should_fail.cold+0x5/0xa [ 2520.056505] ? create_object.isra.0+0x3a/0xa20 [ 2520.056870] should_failslab+0x5/0x20 [ 2520.057174] kmem_cache_alloc+0x5b/0x310 [ 2520.057502] create_object.isra.0+0x3a/0xa20 [ 2520.057856] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2520.058272] __kmalloc_track_caller+0x177/0x370 [ 2520.058643] ? kstrdup_const+0x53/0x80 [ 2520.058960] kstrdup+0x36/0x70 [ 2520.059220] kstrdup_const+0x53/0x80 [ 2520.059521] alloc_vfsmnt+0xb5/0x680 [ 2520.059829] clone_mnt+0x6c/0xce0 [ 2520.060112] copy_tree+0x3b0/0xa60 [ 2520.060402] copy_mnt_ns+0x144/0xa00 [ 2520.060700] ? kmem_cache_alloc+0x2a6/0x310 [ 2520.061048] create_new_namespaces+0xd6/0xb20 [ 2520.061408] copy_namespaces+0x3fb/0x4f0 [ 2520.061733] copy_process+0x385b/0x7800 [ 2520.062051] ? mark_lock+0xf5/0x2df0 [ 2520.062347] ? lock_acquire+0x197/0x470 [ 2520.062676] ? __cleanup_sighand+0xb0/0xb0 [ 2520.063023] ? _copy_from_user+0xfb/0x1b0 [ 2520.063358] kernel_clone+0xe7/0x980 [ 2520.063656] ? lock_acquire+0x197/0x470 [ 2520.063978] ? create_io_thread+0xf0/0xf0 [ 2520.064320] ? ksys_write+0x21a/0x260 [ 2520.064629] ? lock_downgrade+0x6d0/0x6d0 [ 2520.064962] __do_sys_clone3+0x1e5/0x320 [ 2520.065284] ? __do_sys_clone+0x110/0x110 [ 2520.065627] ? rcu_read_lock_any_held+0x75/0xa0 [ 2520.065997] ? vfs_write+0x354/0xa70 [ 2520.066296] ? fput_many+0x2f/0x1a0 [ 2520.066587] ? ksys_write+0x1a9/0x260 [ 2520.066891] ? __ia32_sys_read+0xb0/0xb0 [ 2520.067218] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2520.067639] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2520.068061] ? trace_hardirqs_on+0x5b/0x180 [ 2520.068409] do_syscall_64+0x33/0x40 [ 2520.068712] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2520.069123] RIP: 0033:0x7f3d2b989b19 [ 2520.069423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2520.070871] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2520.071481] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2520.072055] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2520.072623] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2520.073190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2520.073755] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:51 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 77) [ 2520.117186] FAULT_INJECTION: forcing a failure. [ 2520.117186] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.118640] CPU: 1 PID: 44166 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2520.119192] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2520.119851] Call Trace: [ 2520.120073] dump_stack+0x107/0x167 [ 2520.120381] should_fail.cold+0x5/0xa [ 2520.120695] ? alloc_vfsmnt+0x23/0x680 [ 2520.121021] should_failslab+0x5/0x20 [ 2520.121333] kmem_cache_alloc+0x5b/0x310 [ 2520.121663] ? copy_tree+0x61a/0xa60 [ 2520.121965] alloc_vfsmnt+0x23/0x680 [ 2520.122269] clone_mnt+0x6c/0xce0 [ 2520.122559] copy_tree+0x3b0/0xa60 [ 2520.122853] copy_mnt_ns+0x144/0xa00 [ 2520.123159] ? kmem_cache_alloc+0x2a6/0x310 [ 2520.123522] create_new_namespaces+0xd6/0xb20 [ 2520.123890] copy_namespaces+0x3fb/0x4f0 [ 2520.124230] copy_process+0x385b/0x7800 [ 2520.124554] ? mark_lock+0xf5/0x2df0 [ 2520.124860] ? lock_acquire+0x197/0x470 [ 2520.125191] ? __cleanup_sighand+0xb0/0xb0 [ 2520.125544] ? _copy_from_user+0xfb/0x1b0 [ 2520.125880] kernel_clone+0xe7/0x980 [ 2520.126180] ? lock_acquire+0x197/0x470 [ 2520.126506] ? create_io_thread+0xf0/0xf0 [ 2520.126859] ? ksys_write+0x21a/0x260 [ 2520.127168] ? lock_downgrade+0x6d0/0x6d0 [ 2520.127510] __do_sys_clone3+0x1e5/0x320 [ 2520.127852] ? __do_sys_clone+0x110/0x110 [ 2520.128195] ? rcu_read_lock_any_held+0x75/0xa0 [ 2520.128568] ? vfs_write+0x354/0xa70 [ 2520.128872] ? fput_many+0x2f/0x1a0 [ 2520.129168] ? ksys_write+0x1a9/0x260 [ 2520.129483] ? __ia32_sys_read+0xb0/0xb0 [ 2520.129818] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2520.130238] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2520.130657] ? trace_hardirqs_on+0x5b/0x180 [ 2520.131010] do_syscall_64+0x33/0x40 [ 2520.131315] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2520.131730] RIP: 0033:0x7f7f3dd15b19 [ 2520.132044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2520.133531] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2520.134142] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2520.134722] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2520.135302] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2520.135897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2520.136495] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:33:51 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 81) [ 2520.158005] FAULT_INJECTION: forcing a failure. [ 2520.158005] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.158980] CPU: 0 PID: 44169 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2520.159561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2520.160262] Call Trace: [ 2520.160581] dump_stack+0x107/0x167 [ 2520.160888] should_fail.cold+0x5/0xa [ 2520.161215] ? create_object.isra.0+0x3a/0xa20 [ 2520.161599] should_failslab+0x5/0x20 [ 2520.161920] kmem_cache_alloc+0x5b/0x310 [ 2520.162264] create_object.isra.0+0x3a/0xa20 [ 2520.162632] kmemleak_alloc_percpu+0xa0/0x100 [ 2520.163012] pcpu_alloc+0x4e2/0x1240 [ 2520.163331] alloc_vfsmnt+0xfd/0x680 [ 2520.163642] clone_mnt+0x6c/0xce0 [ 2520.163944] copy_tree+0x3b0/0xa60 [ 2520.164245] copy_mnt_ns+0x144/0xa00 [ 2520.164553] ? kmem_cache_alloc+0x2a6/0x310 [ 2520.164919] create_new_namespaces+0xd6/0xb20 [ 2520.165295] copy_namespaces+0x3fb/0x4f0 [ 2520.165635] copy_process+0x385b/0x7800 [ 2520.165974] ? mark_lock+0xf5/0x2df0 [ 2520.166285] ? lock_acquire+0x197/0x470 [ 2520.166632] ? __cleanup_sighand+0xb0/0xb0 [ 2520.166993] ? _copy_from_user+0xfb/0x1b0 [ 2520.167339] kernel_clone+0xe7/0x980 [ 2520.167644] ? lock_acquire+0x197/0x470 [ 2520.167982] ? create_io_thread+0xf0/0xf0 [ 2520.168339] ? ksys_write+0x21a/0x260 [ 2520.168656] ? lock_downgrade+0x6d0/0x6d0 [ 2520.169001] __do_sys_clone3+0x1e5/0x320 [ 2520.169339] ? __do_sys_clone+0x110/0x110 [ 2520.169699] ? rcu_read_lock_any_held+0x75/0xa0 [ 2520.170085] ? vfs_write+0x354/0xa70 [ 2520.170393] ? fput_many+0x2f/0x1a0 [ 2520.170694] ? ksys_write+0x1a9/0x260 [ 2520.171011] ? __ia32_sys_read+0xb0/0xb0 [ 2520.171347] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2520.171785] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2520.172212] ? trace_hardirqs_on+0x5b/0x180 [ 2520.172582] do_syscall_64+0x33/0x40 [ 2520.172892] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2520.173312] RIP: 0033:0x7f3d2b989b19 [ 2520.173622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2520.175118] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2520.175749] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2520.176338] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2520.176926] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2520.177515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2520.178099] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:51 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:51 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 78) 08:33:51 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 82) 08:33:51 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb178", 0x15, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:33:51 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb178", 0x15, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2520.320321] FAULT_INJECTION: forcing a failure. [ 2520.320321] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.321363] CPU: 0 PID: 44177 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2520.321947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2520.322638] Call Trace: [ 2520.322867] dump_stack+0x107/0x167 [ 2520.323178] should_fail.cold+0x5/0xa [ 2520.323502] ? create_object.isra.0+0x3a/0xa20 [ 2520.323896] should_failslab+0x5/0x20 [ 2520.324220] kmem_cache_alloc+0x5b/0x310 [ 2520.324566] create_object.isra.0+0x3a/0xa20 [ 2520.324948] kmemleak_alloc_percpu+0xa0/0x100 [ 2520.325324] pcpu_alloc+0x4e2/0x1240 [ 2520.325644] alloc_vfsmnt+0xfd/0x680 [ 2520.325963] clone_mnt+0x6c/0xce0 [ 2520.326257] copy_tree+0x3b0/0xa60 [ 2520.326564] copy_mnt_ns+0x144/0xa00 [ 2520.326886] ? kmem_cache_alloc+0x2a6/0x310 [ 2520.327250] create_new_namespaces+0xd6/0xb20 [ 2520.327630] copy_namespaces+0x3fb/0x4f0 [ 2520.327981] copy_process+0x385b/0x7800 [ 2520.328318] ? mark_lock+0xf5/0x2df0 [ 2520.328632] ? lock_acquire+0x197/0x470 [ 2520.328971] ? __cleanup_sighand+0xb0/0xb0 [ 2520.329335] ? _copy_from_user+0xfb/0x1b0 [ 2520.329689] kernel_clone+0xe7/0x980 [ 2520.330005] ? lock_acquire+0x197/0x470 [ 2520.330336] ? create_io_thread+0xf0/0xf0 [ 2520.330689] ? ksys_write+0x21a/0x260 [ 2520.331014] ? lock_downgrade+0x6d0/0x6d0 [ 2520.331362] __do_sys_clone3+0x1e5/0x320 [ 2520.331702] ? __do_sys_clone+0x110/0x110 [ 2520.332074] ? rcu_read_lock_any_held+0x75/0xa0 [ 2520.332455] ? vfs_write+0x354/0xa70 [ 2520.332770] ? fput_many+0x2f/0x1a0 [ 2520.333080] ? ksys_write+0x1a9/0x260 [ 2520.333396] ? __ia32_sys_read+0xb0/0xb0 [ 2520.333731] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2520.334168] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2520.334599] ? trace_hardirqs_on+0x5b/0x180 [ 2520.334959] do_syscall_64+0x33/0x40 [ 2520.335270] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2520.335695] RIP: 0033:0x7f3d2b989b19 [ 2520.336012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2520.337539] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2520.338168] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2520.338756] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2520.339355] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2520.339951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2520.340541] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2520.403999] FAULT_INJECTION: forcing a failure. [ 2520.403999] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.405006] CPU: 0 PID: 44179 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2520.405577] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2520.406236] Call Trace: [ 2520.406455] dump_stack+0x107/0x167 [ 2520.406747] should_fail.cold+0x5/0xa [ 2520.407058] ? create_object.isra.0+0x3a/0xa20 [ 2520.407428] should_failslab+0x5/0x20 [ 2520.407745] kmem_cache_alloc+0x5b/0x310 [ 2520.408082] ? find_held_lock+0x2c/0x110 [ 2520.408410] create_object.isra.0+0x3a/0xa20 [ 2520.408769] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2520.409182] kmem_cache_alloc+0x159/0x310 [ 2520.409516] alloc_vfsmnt+0x23/0x680 [ 2520.409822] clone_mnt+0x6c/0xce0 [ 2520.410112] copy_tree+0x3b0/0xa60 [ 2520.410408] copy_mnt_ns+0x144/0xa00 [ 2520.410708] ? kmem_cache_alloc+0x2a6/0x310 [ 2520.411062] create_new_namespaces+0xd6/0xb20 [ 2520.411426] copy_namespaces+0x3fb/0x4f0 [ 2520.411761] copy_process+0x385b/0x7800 [ 2520.412090] ? lock_acquire+0x1b9/0x470 [ 2520.412430] ? __cleanup_sighand+0xb0/0xb0 [ 2520.412780] ? _copy_from_user+0xfb/0x1b0 [ 2520.413119] kernel_clone+0xe7/0x980 [ 2520.413421] ? create_io_thread+0xf0/0xf0 [ 2520.413763] ? lock_downgrade+0x6d0/0x6d0 [ 2520.414101] ? enqueue_hrtimer+0x177/0x2e0 [ 2520.414447] __do_sys_clone3+0x1e5/0x320 [ 2520.414774] ? __do_sys_clone+0x110/0x110 [ 2520.415111] ? recalibrate_cpu_khz+0x10/0x10 [ 2520.415474] ? tick_program_event+0xa8/0x140 [ 2520.415839] ? hrtimer_interrupt+0x771/0x9b0 [ 2520.416199] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2520.416626] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2520.417048] ? trace_hardirqs_on+0x5b/0x180 [ 2520.417398] do_syscall_64+0x33/0x40 [ 2520.417694] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2520.418110] RIP: 0033:0x7f7f3dd15b19 [ 2520.418412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2520.419895] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2520.420532] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2520.421124] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2520.421718] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2520.422311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2520.422905] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:33:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:33:51 executing program 7: pipe(&(0x7f0000000180)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102, 0x0, 0xa83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r0, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(0xffffffffffffffff, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r3) r4 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r5) r6 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r6]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:33:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:33:51 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 83) [ 2520.596089] FAULT_INJECTION: forcing a failure. [ 2520.596089] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.597055] CPU: 0 PID: 44200 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2520.597617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2520.598297] Call Trace: [ 2520.598523] dump_stack+0x107/0x167 [ 2520.598821] should_fail.cold+0x5/0xa [ 2520.599149] ? alloc_vfsmnt+0x23/0x680 [ 2520.599482] should_failslab+0x5/0x20 [ 2520.599803] kmem_cache_alloc+0x5b/0x310 [ 2520.600138] ? copy_tree+0x61a/0xa60 [ 2520.600446] alloc_vfsmnt+0x23/0x680 [ 2520.600747] clone_mnt+0x6c/0xce0 [ 2520.601036] copy_tree+0x3b0/0xa60 [ 2520.601338] copy_mnt_ns+0x144/0xa00 [ 2520.601641] ? kmem_cache_alloc+0x2a6/0x310 [ 2520.601996] create_new_namespaces+0xd6/0xb20 [ 2520.602381] copy_namespaces+0x3fb/0x4f0 [ 2520.602720] copy_process+0x385b/0x7800 [ 2520.603059] ? mark_lock+0xf5/0x2df0 [ 2520.603375] ? lock_acquire+0x197/0x470 [ 2520.603709] ? __cleanup_sighand+0xb0/0xb0 [ 2520.604078] ? _copy_from_user+0xfb/0x1b0 [ 2520.604425] kernel_clone+0xe7/0x980 [ 2520.604732] ? lock_acquire+0x197/0x470 [ 2520.605064] ? create_io_thread+0xf0/0xf0 [ 2520.605408] ? ksys_write+0x21a/0x260 [ 2520.605715] ? lock_downgrade+0x6d0/0x6d0 [ 2520.606068] __do_sys_clone3+0x1e5/0x320 [ 2520.606399] ? __do_sys_clone+0x110/0x110 [ 2520.606745] ? rcu_read_lock_any_held+0x75/0xa0 [ 2520.607127] ? vfs_write+0x354/0xa70 [ 2520.607436] ? fput_many+0x2f/0x1a0 [ 2520.607732] ? ksys_write+0x1a9/0x260 [ 2520.608056] ? __ia32_sys_read+0xb0/0xb0 [ 2520.608397] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2520.608835] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2520.609262] ? trace_hardirqs_on+0x5b/0x180 [ 2520.609632] do_syscall_64+0x33/0x40 [ 2520.609951] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2520.610379] RIP: 0033:0x7f3d2b989b19 [ 2520.610691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2520.612395] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2520.613026] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2520.613603] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2520.614174] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2520.614738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2520.615323] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:33:51 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x5, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2521.413064] cgroup: fork rejected by pids controller in /syz7 08:34:09 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841", 0x1f, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:34:09 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:34:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:34:09 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 79) 08:34:09 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb178", 0x15, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:34:10 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {0x0, 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:34:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:34:10 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 84) [ 2538.961946] FAULT_INJECTION: forcing a failure. [ 2538.961946] name failslab, interval 1, probability 0, space 0, times 0 [ 2538.964021] CPU: 0 PID: 44320 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2538.965068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2538.966320] Call Trace: [ 2538.966730] dump_stack+0x107/0x167 [ 2538.967289] should_fail.cold+0x5/0xa [ 2538.967875] ? create_object.isra.0+0x3a/0xa20 [ 2538.968583] should_failslab+0x5/0x20 [ 2538.969169] kmem_cache_alloc+0x5b/0x310 [ 2538.969788] ? find_held_lock+0x2c/0x110 [ 2538.970414] create_object.isra.0+0x3a/0xa20 [ 2538.971084] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2538.971859] kmem_cache_alloc+0x159/0x310 [ 2538.972503] alloc_vfsmnt+0x23/0x680 [ 2538.973068] clone_mnt+0x6c/0xce0 [ 2538.973608] copy_tree+0x3b0/0xa60 [ 2538.974158] copy_mnt_ns+0x144/0xa00 [ 2538.974728] ? kmem_cache_alloc+0x2a6/0x310 [ 2538.975390] create_new_namespaces+0xd6/0xb20 [ 2538.976093] copy_namespaces+0x3fb/0x4f0 [ 2538.976714] copy_process+0x385b/0x7800 [ 2538.977323] ? mark_lock+0xf5/0x2df0 [ 2538.977896] ? lock_acquire+0x197/0x470 [ 2538.978514] ? __cleanup_sighand+0xb0/0xb0 [ 2538.979174] ? _copy_from_user+0xfb/0x1b0 [ 2538.979812] kernel_clone+0xe7/0x980 [ 2538.980387] ? lock_acquire+0x197/0x470 [ 2538.980990] ? create_io_thread+0xf0/0xf0 [ 2538.981627] ? ksys_write+0x21a/0x260 [ 2538.982204] ? lock_downgrade+0x6d0/0x6d0 [ 2538.982832] __do_sys_clone3+0x1e5/0x320 [ 2538.983451] ? __do_sys_clone+0x110/0x110 [ 2538.984101] ? rcu_read_lock_any_held+0x75/0xa0 [ 2538.984808] ? vfs_write+0x354/0xa70 [ 2538.985368] ? fput_many+0x2f/0x1a0 [ 2538.985921] ? ksys_write+0x1a9/0x260 [ 2538.986501] ? __ia32_sys_read+0xb0/0xb0 [ 2538.987123] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2538.987914] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2538.988702] ? trace_hardirqs_on+0x5b/0x180 [ 2538.989363] do_syscall_64+0x33/0x40 [ 2538.989922] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2538.990696] RIP: 0033:0x7f7f3dd15b19 [ 2538.991256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2538.994030] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2538.995189] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2538.996278] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2538.997358] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2538.998435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2538.999514] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2539.012011] FAULT_INJECTION: forcing a failure. [ 2539.012011] name failslab, interval 1, probability 0, space 0, times 0 [ 2539.013797] CPU: 1 PID: 44326 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2539.014845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2539.016105] Call Trace: [ 2539.016511] dump_stack+0x107/0x167 [ 2539.017068] should_fail.cold+0x5/0xa [ 2539.017652] ? create_object.isra.0+0x3a/0xa20 [ 2539.018350] should_failslab+0x5/0x20 [ 2539.018930] kmem_cache_alloc+0x5b/0x310 [ 2539.019547] ? find_held_lock+0x2c/0x110 [ 2539.020178] create_object.isra.0+0x3a/0xa20 [ 2539.020847] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2539.021622] kmem_cache_alloc+0x159/0x310 [ 2539.022261] alloc_vfsmnt+0x23/0x680 [ 2539.022830] clone_mnt+0x6c/0xce0 [ 2539.023369] copy_tree+0x3b0/0xa60 [ 2539.023922] copy_mnt_ns+0x144/0xa00 [ 2539.024503] ? kmem_cache_alloc+0x2a6/0x310 [ 2539.025167] create_new_namespaces+0xd6/0xb20 [ 2539.025859] copy_namespaces+0x3fb/0x4f0 [ 2539.026482] copy_process+0x385b/0x7800 [ 2539.027090] ? mark_lock+0xf5/0x2df0 [ 2539.027665] ? lock_acquire+0x197/0x470 [ 2539.028295] ? __cleanup_sighand+0xb0/0xb0 [ 2539.028957] ? _copy_from_user+0xfb/0x1b0 [ 2539.029596] kernel_clone+0xe7/0x980 [ 2539.030167] ? lock_acquire+0x197/0x470 [ 2539.030773] ? create_io_thread+0xf0/0xf0 [ 2539.031419] ? ksys_write+0x21a/0x260 [ 2539.032007] ? lock_downgrade+0x6d0/0x6d0 [ 2539.032644] __do_sys_clone3+0x1e5/0x320 [ 2539.033263] ? __do_sys_clone+0x110/0x110 [ 2539.033912] ? rcu_read_lock_any_held+0x75/0xa0 [ 2539.034620] ? vfs_write+0x354/0xa70 [ 2539.035189] ? fput_many+0x2f/0x1a0 [ 2539.035745] ? ksys_write+0x1a9/0x260 [ 2539.036334] ? __ia32_sys_read+0xb0/0xb0 [ 2539.036959] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2539.037758] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2539.038538] ? trace_hardirqs_on+0x5b/0x180 [ 2539.039202] do_syscall_64+0x33/0x40 [ 2539.039770] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2539.040559] RIP: 0033:0x7f3d2b989b19 [ 2539.041130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2539.043915] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2539.045081] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2539.046173] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2539.047260] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2539.048348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2539.049432] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:34:10 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 80) [ 2539.333070] FAULT_INJECTION: forcing a failure. [ 2539.333070] name failslab, interval 1, probability 0, space 0, times 0 [ 2539.335196] CPU: 1 PID: 44346 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2539.336436] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2539.337844] Call Trace: [ 2539.338304] dump_stack+0x107/0x167 [ 2539.338915] should_fail.cold+0x5/0xa [ 2539.339618] ? create_object.isra.0+0x3a/0xa20 [ 2539.340464] should_failslab+0x5/0x20 [ 2539.341116] kmem_cache_alloc+0x5b/0x310 [ 2539.341800] create_object.isra.0+0x3a/0xa20 [ 2539.342558] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2539.343440] __kmalloc_track_caller+0x177/0x370 [ 2539.344321] ? kstrdup_const+0x53/0x80 [ 2539.344962] kstrdup+0x36/0x70 [ 2539.345499] kstrdup_const+0x53/0x80 [ 2539.346134] alloc_vfsmnt+0xb5/0x680 [ 2539.346805] clone_mnt+0x6c/0xce0 [ 2539.347410] copy_tree+0x3b0/0xa60 [ 2539.348088] copy_mnt_ns+0x144/0xa00 [ 2539.348695] ? kmem_cache_alloc+0x2a6/0x310 [ 2539.349453] create_new_namespaces+0xd6/0xb20 [ 2539.350189] copy_namespaces+0x3fb/0x4f0 [ 2539.350899] copy_process+0x385b/0x7800 [ 2539.351620] ? mark_lock+0xf5/0x2df0 [ 2539.352272] ? lock_acquire+0x197/0x470 [ 2539.352937] ? __cleanup_sighand+0xb0/0xb0 [ 2539.353692] ? _copy_from_user+0xfb/0x1b0 [ 2539.354424] kernel_clone+0xe7/0x980 [ 2539.355067] ? lock_acquire+0x197/0x470 [ 2539.355786] ? create_io_thread+0xf0/0xf0 [ 2539.356481] ? ksys_write+0x21a/0x260 [ 2539.357175] ? lock_downgrade+0x6d0/0x6d0 [ 2539.357851] __do_sys_clone3+0x1e5/0x320 [ 2539.358564] ? __do_sys_clone+0x110/0x110 [ 2539.359375] ? rcu_read_lock_any_held+0x75/0xa0 [ 2539.360142] ? vfs_write+0x354/0xa70 [ 2539.360805] ? fput_many+0x2f/0x1a0 [ 2539.361399] ? ksys_write+0x1a9/0x260 [ 2539.362084] ? __ia32_sys_read+0xb0/0xb0 [ 2539.362830] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2539.363726] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2539.364629] ? trace_hardirqs_on+0x5b/0x180 [ 2539.365347] do_syscall_64+0x33/0x40 [ 2539.366018] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2539.366967] RIP: 0033:0x7f7f3dd15b19 [ 2539.367577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2539.370767] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2539.372075] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2539.373298] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2539.374560] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2539.375781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2539.377012] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:34:26 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 85) 08:34:26 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 81) 08:34:26 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {0x0, 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:34:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:34:26 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r1) r2 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) connect$bt_l2cap(r1, &(0x7f0000000180)={0x1f, 0x3, @none, 0x1ff, 0x2}, 0xe) r3 = getpgrp(0x0) tgkill(r3, r3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r3, 0x9, r4, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:34:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2555.953800] FAULT_INJECTION: forcing a failure. [ 2555.953800] name failslab, interval 1, probability 0, space 0, times 0 [ 2555.955216] CPU: 0 PID: 44361 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2555.956043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2555.957036] Call Trace: [ 2555.957359] dump_stack+0x107/0x167 [ 2555.957797] should_fail.cold+0x5/0xa [ 2555.958257] should_failslab+0x5/0x20 [ 2555.958748] __kmalloc_track_caller+0x79/0x370 [ 2555.959297] ? kstrdup_const+0x53/0x80 [ 2555.959763] kstrdup+0x36/0x70 [ 2555.960150] kstrdup_const+0x53/0x80 [ 2555.960600] alloc_vfsmnt+0xb5/0x680 [ 2555.961048] clone_mnt+0x6c/0xce0 [ 2555.961464] copy_tree+0x3b0/0xa60 [ 2555.961894] copy_mnt_ns+0x144/0xa00 [ 2555.962334] ? kmem_cache_alloc+0x2a6/0x310 [ 2555.962850] create_new_namespaces+0xd6/0xb20 [ 2555.963393] copy_namespaces+0x3fb/0x4f0 [ 2555.963878] copy_process+0x385b/0x7800 [ 2555.964356] ? mark_lock+0xf5/0x2df0 [ 2555.964802] ? lock_acquire+0x197/0x470 [ 2555.965287] ? __cleanup_sighand+0xb0/0xb0 [ 2555.965799] ? _copy_from_user+0xfb/0x1b0 [ 2555.966296] kernel_clone+0xe7/0x980 [ 2555.966736] ? lock_acquire+0x197/0x470 [ 2555.967215] ? create_io_thread+0xf0/0xf0 [ 2555.967723] ? ksys_write+0x21a/0x260 [ 2555.968181] ? lock_downgrade+0x6d0/0x6d0 [ 2555.968673] __do_sys_clone3+0x1e5/0x320 [ 2555.969154] ? __do_sys_clone+0x110/0x110 [ 2555.969660] ? rcu_read_lock_any_held+0x75/0xa0 [ 2555.970210] ? vfs_write+0x354/0xa70 [ 2555.970653] ? fput_many+0x2f/0x1a0 [ 2555.971088] ? ksys_write+0x1a9/0x260 [ 2555.971540] ? __ia32_sys_read+0xb0/0xb0 [ 2555.972023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2555.972647] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2555.973266] ? trace_hardirqs_on+0x5b/0x180 [ 2555.973781] do_syscall_64+0x33/0x40 [ 2555.974224] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2555.974836] RIP: 0033:0x7f3d2b989b19 [ 2555.975227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2555.977035] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2555.977793] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2555.978498] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2555.979199] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2555.979898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2555.980610] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:34:27 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841", 0x1f, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:34:27 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb178", 0x15, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2556.000359] FAULT_INJECTION: forcing a failure. [ 2556.000359] name failslab, interval 1, probability 0, space 0, times 0 [ 2556.002004] CPU: 0 PID: 44371 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2556.002707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2556.003538] Call Trace: [ 2556.003804] dump_stack+0x107/0x167 [ 2556.004175] should_fail.cold+0x5/0xa [ 2556.004561] ? create_object.isra.0+0x3a/0xa20 [ 2556.005019] should_failslab+0x5/0x20 [ 2556.005399] kmem_cache_alloc+0x5b/0x310 [ 2556.005815] create_object.isra.0+0x3a/0xa20 [ 2556.006261] kmemleak_alloc_percpu+0xa0/0x100 [ 2556.006710] pcpu_alloc+0x4e2/0x1240 [ 2556.007099] alloc_vfsmnt+0xfd/0x680 [ 2556.007472] clone_mnt+0x6c/0xce0 [ 2556.007831] copy_tree+0x3b0/0xa60 [ 2556.008206] copy_mnt_ns+0x144/0xa00 [ 2556.008585] ? kmem_cache_alloc+0x2a6/0x310 [ 2556.009027] create_new_namespaces+0xd6/0xb20 [ 2556.009484] copy_namespaces+0x3fb/0x4f0 [ 2556.009890] copy_process+0x385b/0x7800 [ 2556.010292] ? mark_lock+0xf5/0x2df0 [ 2556.010672] ? lock_acquire+0x197/0x470 [ 2556.011088] ? __cleanup_sighand+0xb0/0xb0 [ 2556.011532] ? _copy_from_user+0xfb/0x1b0 [ 2556.011956] kernel_clone+0xe7/0x980 [ 2556.012346] ? lock_acquire+0x197/0x470 [ 2556.012746] ? create_io_thread+0xf0/0xf0 [ 2556.013174] ? ksys_write+0x21a/0x260 [ 2556.013559] ? lock_downgrade+0x6d0/0x6d0 [ 2556.013979] __do_sys_clone3+0x1e5/0x320 [ 2556.014391] ? __do_sys_clone+0x110/0x110 [ 2556.014818] ? rcu_read_lock_any_held+0x75/0xa0 [ 2556.015297] ? vfs_write+0x354/0xa70 [ 2556.015685] ? fput_many+0x2f/0x1a0 [ 2556.016057] ? ksys_write+0x1a9/0x260 [ 2556.016447] ? __ia32_sys_read+0xb0/0xb0 [ 2556.016859] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2556.017369] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2556.017886] ? trace_hardirqs_on+0x5b/0x180 [ 2556.018320] do_syscall_64+0x33/0x40 [ 2556.018691] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2556.019205] RIP: 0033:0x7f7f3dd15b19 [ 2556.019581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2556.021403] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2556.022176] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2556.022887] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2556.023599] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2556.024316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2556.025028] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:34:27 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 86) [ 2556.144898] FAULT_INJECTION: forcing a failure. [ 2556.144898] name failslab, interval 1, probability 0, space 0, times 0 [ 2556.146100] CPU: 0 PID: 44388 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2556.146802] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2556.147636] Call Trace: [ 2556.147916] dump_stack+0x107/0x167 [ 2556.148293] should_fail.cold+0x5/0xa [ 2556.148685] ? create_object.isra.0+0x3a/0xa20 [ 2556.149147] ? create_object.isra.0+0x3a/0xa20 [ 2556.149601] should_failslab+0x5/0x20 [ 2556.149995] kmem_cache_alloc+0x5b/0x310 [ 2556.150409] create_object.isra.0+0x3a/0xa20 [ 2556.150852] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2556.151375] __kmalloc_track_caller+0x177/0x370 [ 2556.151846] ? kstrdup_const+0x53/0x80 [ 2556.152258] kstrdup+0x36/0x70 [ 2556.152596] kstrdup_const+0x53/0x80 [ 2556.152978] alloc_vfsmnt+0xb5/0x680 [ 2556.153363] clone_mnt+0x6c/0xce0 [ 2556.153729] copy_tree+0x3b0/0xa60 [ 2556.154107] copy_mnt_ns+0x144/0xa00 [ 2556.154485] ? kmem_cache_alloc+0x2a6/0x310 [ 2556.154934] create_new_namespaces+0xd6/0xb20 [ 2556.155396] copy_namespaces+0x3fb/0x4f0 [ 2556.155816] copy_process+0x385b/0x7800 [ 2556.156229] ? mark_lock+0xf5/0x2df0 [ 2556.156624] ? lock_acquire+0x197/0x470 [ 2556.157037] ? __cleanup_sighand+0xb0/0xb0 [ 2556.157481] ? _copy_from_user+0xfb/0x1b0 [ 2556.157912] kernel_clone+0xe7/0x980 [ 2556.158293] ? lock_acquire+0x197/0x470 [ 2556.158697] ? create_io_thread+0xf0/0xf0 [ 2556.159134] ? ksys_write+0x21a/0x260 [ 2556.159526] ? lock_downgrade+0x6d0/0x6d0 [ 2556.159979] __do_sys_clone3+0x1e5/0x320 [ 2556.160398] ? __do_sys_clone+0x110/0x110 [ 2556.160838] ? rcu_read_lock_any_held+0x75/0xa0 [ 2556.161306] ? vfs_write+0x354/0xa70 [ 2556.161698] ? fput_many+0x2f/0x1a0 [ 2556.162084] ? ksys_write+0x1a9/0x260 [ 2556.162485] ? __ia32_sys_read+0xb0/0xb0 [ 2556.162907] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2556.163455] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2556.163995] ? trace_hardirqs_on+0x5b/0x180 [ 2556.164459] do_syscall_64+0x33/0x40 [ 2556.164844] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2556.165369] RIP: 0033:0x7f3d2b989b19 [ 2556.165749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2556.167658] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2556.168460] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2556.169204] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2556.169926] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2556.170655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2556.171393] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:34:27 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 82) 08:34:27 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 87) [ 2556.433987] FAULT_INJECTION: forcing a failure. [ 2556.433987] name failslab, interval 1, probability 0, space 0, times 0 [ 2556.434981] CPU: 0 PID: 44395 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2556.435529] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2556.436199] Call Trace: [ 2556.436421] dump_stack+0x107/0x167 [ 2556.436717] should_fail.cold+0x5/0xa [ 2556.437034] ? create_object.isra.0+0x3a/0xa20 [ 2556.437401] should_failslab+0x5/0x20 [ 2556.437710] kmem_cache_alloc+0x5b/0x310 [ 2556.438044] ? mark_held_locks+0x9e/0xe0 [ 2556.438373] create_object.isra.0+0x3a/0xa20 [ 2556.438730] kmemleak_alloc_percpu+0xa0/0x100 [ 2556.439089] pcpu_alloc+0x4e2/0x1240 [ 2556.439395] alloc_vfsmnt+0xfd/0x680 [ 2556.439693] clone_mnt+0x6c/0xce0 [ 2556.439974] copy_tree+0x3b0/0xa60 [ 2556.440271] copy_mnt_ns+0x144/0xa00 [ 2556.440576] ? kmem_cache_alloc+0x2a6/0x310 [ 2556.440925] create_new_namespaces+0xd6/0xb20 [ 2556.441286] copy_namespaces+0x3fb/0x4f0 [ 2556.441614] copy_process+0x385b/0x7800 [ 2556.441933] ? mark_lock+0xf5/0x2df0 [ 2556.442236] ? lock_acquire+0x197/0x470 [ 2556.442560] ? __cleanup_sighand+0xb0/0xb0 [ 2556.442903] ? _copy_from_user+0xfb/0x1b0 [ 2556.443238] kernel_clone+0xe7/0x980 [ 2556.443544] ? lock_acquire+0x197/0x470 [ 2556.443864] ? create_io_thread+0xf0/0xf0 [ 2556.444209] ? ksys_write+0x21a/0x260 [ 2556.444517] ? lock_downgrade+0x6d0/0x6d0 [ 2556.444868] __do_sys_clone3+0x1e5/0x320 [ 2556.445194] ? __do_sys_clone+0x110/0x110 [ 2556.445540] ? rcu_read_lock_any_held+0x75/0xa0 [ 2556.445909] ? vfs_write+0x354/0xa70 [ 2556.446209] ? fput_many+0x2f/0x1a0 [ 2556.446502] ? ksys_write+0x1a9/0x260 [ 2556.446814] ? __ia32_sys_read+0xb0/0xb0 [ 2556.447139] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2556.447552] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2556.447964] ? trace_hardirqs_on+0x5b/0x180 [ 2556.448317] do_syscall_64+0x33/0x40 [ 2556.448617] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2556.449049] RIP: 0033:0x7f7f3dd15b19 [ 2556.449349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2556.450873] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2556.451485] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2556.452078] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2556.452678] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2556.453243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2556.453837] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2556.563309] FAULT_INJECTION: forcing a failure. [ 2556.563309] name failslab, interval 1, probability 0, space 0, times 0 [ 2556.565154] CPU: 1 PID: 44397 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2556.566242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2556.567554] Call Trace: [ 2556.567984] dump_stack+0x107/0x167 [ 2556.568573] should_fail.cold+0x5/0xa [ 2556.569184] ? create_object.isra.0+0x3a/0xa20 [ 2556.569914] should_failslab+0x5/0x20 [ 2556.570520] kmem_cache_alloc+0x5b/0x310 [ 2556.571177] create_object.isra.0+0x3a/0xa20 [ 2556.571887] kmemleak_alloc_percpu+0xa0/0x100 [ 2556.572602] pcpu_alloc+0x4e2/0x1240 [ 2556.573211] alloc_vfsmnt+0xfd/0x680 [ 2556.573802] clone_mnt+0x6c/0xce0 [ 2556.574359] copy_tree+0x3b0/0xa60 [ 2556.574931] copy_mnt_ns+0x144/0xa00 [ 2556.575521] ? kmem_cache_alloc+0x2a6/0x310 [ 2556.576215] create_new_namespaces+0xd6/0xb20 [ 2556.576928] copy_namespaces+0x3fb/0x4f0 [ 2556.577570] copy_process+0x385b/0x7800 [ 2556.578197] ? mark_lock+0xf5/0x2df0 [ 2556.578791] ? lock_acquire+0x197/0x470 [ 2556.579439] ? __cleanup_sighand+0xb0/0xb0 [ 2556.580124] ? _copy_from_user+0xfb/0x1b0 [ 2556.580794] kernel_clone+0xe7/0x980 [ 2556.581381] ? lock_acquire+0x197/0x470 [ 2556.582008] ? create_io_thread+0xf0/0xf0 [ 2556.582676] ? ksys_write+0x21a/0x260 [ 2556.583276] ? lock_downgrade+0x6d0/0x6d0 [ 2556.583931] __do_sys_clone3+0x1e5/0x320 [ 2556.584574] ? __do_sys_clone+0x110/0x110 [ 2556.585249] ? rcu_read_lock_any_held+0x75/0xa0 [ 2556.585971] ? vfs_write+0x354/0xa70 [ 2556.586554] ? fput_many+0x2f/0x1a0 [ 2556.587123] ? ksys_write+0x1a9/0x260 [ 2556.587718] ? __ia32_sys_read+0xb0/0xb0 [ 2556.588361] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2556.589171] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2556.589989] ? trace_hardirqs_on+0x5b/0x180 [ 2556.590665] do_syscall_64+0x33/0x40 [ 2556.591242] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2556.592029] RIP: 0033:0x7f3d2b989b19 [ 2556.592616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2556.595429] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2556.596593] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2556.597687] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2556.598769] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2556.599851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2556.600942] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:34:27 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841", 0x1f, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:34:27 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841", 0x1f, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:34:27 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {0x0, 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:34:27 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 88) 08:34:27 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 83) [ 2556.780109] FAULT_INJECTION: forcing a failure. [ 2556.780109] name failslab, interval 1, probability 0, space 0, times 0 [ 2556.781260] CPU: 0 PID: 44411 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2556.781819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2556.782480] Call Trace: [ 2556.782706] dump_stack+0x107/0x167 [ 2556.783008] should_fail.cold+0x5/0xa [ 2556.783320] ? alloc_vfsmnt+0x23/0x680 [ 2556.783642] ? alloc_vfsmnt+0x23/0x680 [ 2556.783962] should_failslab+0x5/0x20 [ 2556.784289] kmem_cache_alloc+0x5b/0x310 [ 2556.784622] ? copy_tree+0x61a/0xa60 [ 2556.784926] alloc_vfsmnt+0x23/0x680 [ 2556.785231] clone_mnt+0x6c/0xce0 [ 2556.785523] copy_tree+0x3b0/0xa60 [ 2556.785825] copy_mnt_ns+0x144/0xa00 [ 2556.786129] ? kmem_cache_alloc+0x2a6/0x310 [ 2556.786484] create_new_namespaces+0xd6/0xb20 [ 2556.786855] copy_namespaces+0x3fb/0x4f0 [ 2556.787185] copy_process+0x385b/0x7800 [ 2556.787512] ? mark_lock+0xf5/0x2df0 [ 2556.787820] ? lock_acquire+0x197/0x470 [ 2556.788153] ? __cleanup_sighand+0xb0/0xb0 [ 2556.788514] ? _copy_from_user+0xfb/0x1b0 [ 2556.788859] kernel_clone+0xe7/0x980 [ 2556.789162] ? lock_acquire+0x197/0x470 [ 2556.789482] ? create_io_thread+0xf0/0xf0 [ 2556.789838] ? ksys_write+0x21a/0x260 [ 2556.790148] ? lock_downgrade+0x6d0/0x6d0 [ 2556.790486] __do_sys_clone3+0x1e5/0x320 [ 2556.790818] ? __do_sys_clone+0x110/0x110 [ 2556.791171] ? rcu_read_lock_any_held+0x75/0xa0 [ 2556.791548] ? vfs_write+0x354/0xa70 [ 2556.791851] ? fput_many+0x2f/0x1a0 [ 2556.792146] ? ksys_write+0x1a9/0x260 [ 2556.792464] ? __ia32_sys_read+0xb0/0xb0 [ 2556.792803] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2556.793223] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2556.793640] ? trace_hardirqs_on+0x5b/0x180 [ 2556.793993] do_syscall_64+0x33/0x40 [ 2556.794295] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2556.794706] RIP: 0033:0x7f7f3dd15b19 [ 2556.795011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2556.796497] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2556.797116] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2556.797692] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2556.798258] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2556.798831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2556.799402] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:34:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:34:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2556.863658] FAULT_INJECTION: forcing a failure. [ 2556.863658] name failslab, interval 1, probability 0, space 0, times 0 [ 2556.864608] CPU: 0 PID: 44416 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2556.865176] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2556.865844] Call Trace: [ 2556.866061] dump_stack+0x107/0x167 [ 2556.866365] should_fail.cold+0x5/0xa [ 2556.866684] ? create_object.isra.0+0x3a/0xa20 [ 2556.867070] should_failslab+0x5/0x20 [ 2556.867383] kmem_cache_alloc+0x5b/0x310 [ 2556.867724] ? mark_held_locks+0x9e/0xe0 [ 2556.868069] create_object.isra.0+0x3a/0xa20 [ 2556.868446] kmemleak_alloc_percpu+0xa0/0x100 [ 2556.868824] pcpu_alloc+0x4e2/0x1240 [ 2556.869148] alloc_vfsmnt+0xfd/0x680 [ 2556.869448] clone_mnt+0x6c/0xce0 [ 2556.869744] copy_tree+0x3b0/0xa60 [ 2556.870054] copy_mnt_ns+0x144/0xa00 [ 2556.870365] ? kmem_cache_alloc+0x2a6/0x310 [ 2556.870721] create_new_namespaces+0xd6/0xb20 [ 2556.871103] copy_namespaces+0x3fb/0x4f0 [ 2556.871443] copy_process+0x385b/0x7800 [ 2556.871791] ? mark_lock+0xf5/0x2df0 [ 2556.872107] ? lock_acquire+0x197/0x470 [ 2556.872456] ? __cleanup_sighand+0xb0/0xb0 [ 2556.872816] ? _copy_from_user+0xfb/0x1b0 [ 2556.873168] kernel_clone+0xe7/0x980 [ 2556.873476] ? lock_acquire+0x197/0x470 [ 2556.873808] ? create_io_thread+0xf0/0xf0 [ 2556.874155] ? ksys_write+0x21a/0x260 [ 2556.874477] ? lock_downgrade+0x6d0/0x6d0 [ 2556.874824] __do_sys_clone3+0x1e5/0x320 [ 2556.875158] ? __do_sys_clone+0x110/0x110 [ 2556.875524] ? rcu_read_lock_any_held+0x75/0xa0 [ 2556.875912] ? vfs_write+0x354/0xa70 [ 2556.876214] ? fput_many+0x2f/0x1a0 [ 2556.876526] ? ksys_write+0x1a9/0x260 [ 2556.876838] ? __ia32_sys_read+0xb0/0xb0 [ 2556.877176] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2556.877613] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2556.878022] ? trace_hardirqs_on+0x5b/0x180 [ 2556.878378] do_syscall_64+0x33/0x40 [ 2556.878684] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2556.879089] RIP: 0033:0x7f3d2b989b19 [ 2556.879393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2556.880886] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2556.881515] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2556.882106] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2556.882693] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2556.883287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2556.883886] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:34:27 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000002c0)={0x0, 0x316d4e37, 0x6, 0x6f91, 0x2}) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r2 = getpgrp(0x0) tgkill(r2, r2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r3, &(0x7f0000000180)={0x1f, 0x4, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x9}, 0xe) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r2, 0x9, r4, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r1, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x20, 0x1, 0x5, 0x6, 0x0, 0x0, 0x4408, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0xc2, 0x8}, 0x10100, 0x2, 0x2, 0x5, 0x6, 0x8, 0x4, 0x0, 0xfe7, 0x0, 0x2}, r5, 0xf, r0, 0x2) syz_io_uring_complete(0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r6) r7 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7]) fcntl$dupfd(r4, 0x0, r6) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:34:28 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 84) 08:34:28 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841", 0x1f, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2557.165248] FAULT_INJECTION: forcing a failure. [ 2557.165248] name failslab, interval 1, probability 0, space 0, times 0 [ 2557.167302] CPU: 1 PID: 44439 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2557.168405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2557.169706] Call Trace: [ 2557.170134] dump_stack+0x107/0x167 [ 2557.170714] should_fail.cold+0x5/0xa [ 2557.171326] ? create_object.isra.0+0x3a/0xa20 [ 2557.172053] should_failslab+0x5/0x20 [ 2557.172665] kmem_cache_alloc+0x5b/0x310 [ 2557.173321] create_object.isra.0+0x3a/0xa20 [ 2557.174030] kmemleak_alloc_percpu+0xa0/0x100 [ 2557.174754] pcpu_alloc+0x4e2/0x1240 [ 2557.175379] alloc_vfsmnt+0xfd/0x680 [ 2557.175978] clone_mnt+0x6c/0xce0 [ 2557.176560] copy_tree+0x3b0/0xa60 [ 2557.177145] copy_mnt_ns+0x144/0xa00 [ 2557.177748] ? kmem_cache_alloc+0x2a6/0x310 [ 2557.178438] create_new_namespaces+0xd6/0xb20 [ 2557.179158] copy_namespaces+0x3fb/0x4f0 [ 2557.179810] copy_process+0x385b/0x7800 [ 2557.180448] ? mark_lock+0xf5/0x2df0 [ 2557.181049] ? lock_acquire+0x197/0x470 [ 2557.181697] ? __cleanup_sighand+0xb0/0xb0 [ 2557.182385] ? _copy_from_user+0xfb/0x1b0 [ 2557.183046] kernel_clone+0xe7/0x980 [ 2557.183637] ? lock_acquire+0x197/0x470 [ 2557.184273] ? create_io_thread+0xf0/0xf0 [ 2557.184947] ? ksys_write+0x21a/0x260 [ 2557.185550] ? lock_downgrade+0x6d0/0x6d0 [ 2557.186210] __do_sys_clone3+0x1e5/0x320 [ 2557.186853] ? __do_sys_clone+0x110/0x110 [ 2557.187529] ? rcu_read_lock_any_held+0x75/0xa0 [ 2557.188272] ? vfs_write+0x354/0xa70 [ 2557.188862] ? fput_many+0x2f/0x1a0 [ 2557.189442] ? ksys_write+0x1a9/0x260 [ 2557.190045] ? __ia32_sys_read+0xb0/0xb0 [ 2557.190693] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2557.191522] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2557.192343] ? trace_hardirqs_on+0x5b/0x180 [ 2557.193033] do_syscall_64+0x33/0x40 [ 2557.193622] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2557.194437] RIP: 0033:0x7f7f3dd15b19 [ 2557.195029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2557.197912] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2557.199114] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2557.200243] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2557.201363] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2557.202479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2557.203598] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:34:48 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 89) 08:34:48 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getdents(0xffffffffffffffff, &(0x7f0000000180)=""/214, 0xd6) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:34:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:34:48 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 85) 08:34:48 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0), 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:34:48 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9", 0x24, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2577.926516] FAULT_INJECTION: forcing a failure. [ 2577.926516] name failslab, interval 1, probability 0, space 0, times 0 [ 2577.927775] CPU: 0 PID: 44454 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2577.928454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2577.929256] Call Trace: [ 2577.929523] dump_stack+0x107/0x167 [ 2577.929883] should_fail.cold+0x5/0xa [ 2577.930255] ? create_object.isra.0+0x3a/0xa20 [ 2577.930704] should_failslab+0x5/0x20 [ 2577.931078] kmem_cache_alloc+0x5b/0x310 [ 2577.931478] create_object.isra.0+0x3a/0xa20 [ 2577.932014] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2577.932522] kmem_cache_alloc+0x159/0x310 [ 2577.932932] alloc_vfsmnt+0x23/0x680 [ 2577.933294] clone_mnt+0x6c/0xce0 [ 2577.933640] copy_tree+0x3b0/0xa60 [ 2577.933992] copy_mnt_ns+0x144/0xa00 [ 2577.934356] ? kmem_cache_alloc+0x2a6/0x310 [ 2577.934782] create_new_namespaces+0xd6/0xb20 [ 2577.935223] copy_namespaces+0x3fb/0x4f0 [ 2577.935621] copy_process+0x385b/0x7800 [ 2577.936012] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2577.936531] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2577.937056] ? lock_acquire+0x197/0x470 [ 2577.937458] ? __cleanup_sighand+0xb0/0xb0 [ 2577.937881] ? _copy_from_user+0xfb/0x1b0 [ 2577.938289] kernel_clone+0xe7/0x980 [ 2577.938656] ? create_io_thread+0xf0/0xf0 [ 2577.939069] ? ksys_write+0x21a/0x260 [ 2577.939444] ? lock_downgrade+0x6d0/0x6d0 [ 2577.939852] __do_sys_clone3+0x1e5/0x320 [ 2577.940250] ? __do_sys_clone+0x110/0x110 [ 2577.940670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2577.941179] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2577.941706] ? trace_hardirqs_on+0x5b/0x180 [ 2577.942126] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2577.942661] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2577.943163] ? syscall_enter_from_user_mode+0x27/0x50 [ 2577.943668] do_syscall_64+0x33/0x40 [ 2577.944029] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2577.944529] RIP: 0033:0x7f7f3dd15b19 [ 2577.944893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2577.946661] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2577.947398] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2577.948089] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2577.948785] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2577.949486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2577.950191] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2577.955790] FAULT_INJECTION: forcing a failure. [ 2577.955790] name failslab, interval 1, probability 0, space 0, times 0 08:34:48 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841", 0x1f, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:34:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2577.957662] CPU: 1 PID: 44460 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2577.958948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2577.960250] Call Trace: [ 2577.960686] dump_stack+0x107/0x167 [ 2577.961266] should_fail.cold+0x5/0xa [ 2577.961876] ? alloc_vfsmnt+0x23/0x680 [ 2577.962498] should_failslab+0x5/0x20 [ 2577.963104] kmem_cache_alloc+0x5b/0x310 [ 2577.963749] ? copy_tree+0x61a/0xa60 [ 2577.964343] alloc_vfsmnt+0x23/0x680 [ 2577.964947] clone_mnt+0x6c/0xce0 [ 2577.965507] copy_tree+0x3b0/0xa60 [ 2577.966083] copy_mnt_ns+0x144/0xa00 [ 2577.966674] ? kmem_cache_alloc+0x2a6/0x310 [ 2577.967365] create_new_namespaces+0xd6/0xb20 [ 2577.968085] copy_namespaces+0x3fb/0x4f0 [ 2577.968744] copy_process+0x385b/0x7800 [ 2577.969376] ? mark_lock+0xf5/0x2df0 [ 2577.969980] ? lock_acquire+0x197/0x470 [ 2577.970629] ? __cleanup_sighand+0xb0/0xb0 [ 2577.971316] ? _copy_from_user+0xfb/0x1b0 [ 2577.971983] kernel_clone+0xe7/0x980 [ 2577.972586] ? lock_acquire+0x197/0x470 [ 2577.973215] ? create_io_thread+0xf0/0xf0 [ 2577.973890] ? ksys_write+0x21a/0x260 [ 2577.974491] ? lock_downgrade+0x6d0/0x6d0 [ 2577.975153] __do_sys_clone3+0x1e5/0x320 [ 2577.975802] ? __do_sys_clone+0x110/0x110 [ 2577.976486] ? rcu_read_lock_any_held+0x75/0xa0 [ 2577.977221] ? vfs_write+0x354/0xa70 [ 2577.977810] ? fput_many+0x2f/0x1a0 [ 2577.978389] ? ksys_write+0x1a9/0x260 [ 2577.978993] ? __ia32_sys_read+0xb0/0xb0 [ 2577.979645] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2577.980480] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2577.981290] ? trace_hardirqs_on+0x5b/0x180 [ 2577.981977] do_syscall_64+0x33/0x40 [ 2577.982565] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2577.983372] RIP: 0033:0x7f3d2b989b19 [ 2577.983962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2577.986844] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2577.988036] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2577.989158] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2577.990276] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2577.991391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2577.992512] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:34:49 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 90) 08:34:49 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 86) [ 2578.224889] FAULT_INJECTION: forcing a failure. [ 2578.224889] name failslab, interval 1, probability 0, space 0, times 0 [ 2578.226116] CPU: 0 PID: 44484 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2578.226815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2578.227641] Call Trace: [ 2578.227912] dump_stack+0x107/0x167 [ 2578.228284] should_fail.cold+0x5/0xa [ 2578.228678] ? create_object.isra.0+0x3a/0xa20 [ 2578.229139] should_failslab+0x5/0x20 [ 2578.229523] kmem_cache_alloc+0x5b/0x310 [ 2578.229931] ? find_held_lock+0x2c/0x110 [ 2578.230340] create_object.isra.0+0x3a/0xa20 [ 2578.230784] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2578.231301] kmem_cache_alloc+0x159/0x310 [ 2578.231712] alloc_vfsmnt+0x23/0x680 [ 2578.232093] clone_mnt+0x6c/0xce0 [ 2578.232458] copy_tree+0x3b0/0xa60 [ 2578.232823] copy_mnt_ns+0x144/0xa00 [ 2578.233201] ? kmem_cache_alloc+0x2a6/0x310 [ 2578.233641] create_new_namespaces+0xd6/0xb20 [ 2578.234101] copy_namespaces+0x3fb/0x4f0 [ 2578.234511] copy_process+0x385b/0x7800 [ 2578.234911] ? mark_lock+0xf5/0x2df0 [ 2578.235294] ? lock_acquire+0x197/0x470 [ 2578.235711] ? __cleanup_sighand+0xb0/0xb0 [ 2578.236147] ? _copy_from_user+0xfb/0x1b0 [ 2578.236581] kernel_clone+0xe7/0x980 [ 2578.236958] ? lock_acquire+0x197/0x470 [ 2578.237360] ? create_io_thread+0xf0/0xf0 [ 2578.237790] ? ksys_write+0x21a/0x260 [ 2578.238179] ? lock_downgrade+0x6d0/0x6d0 [ 2578.238601] __do_sys_clone3+0x1e5/0x320 [ 2578.239015] ? __do_sys_clone+0x110/0x110 [ 2578.239445] ? rcu_read_lock_any_held+0x75/0xa0 [ 2578.239910] ? vfs_write+0x354/0xa70 [ 2578.240292] ? fput_many+0x2f/0x1a0 [ 2578.240665] ? ksys_write+0x1a9/0x260 [ 2578.241050] ? __ia32_sys_read+0xb0/0xb0 [ 2578.241463] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2578.241989] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2578.242507] ? trace_hardirqs_on+0x5b/0x180 [ 2578.242943] do_syscall_64+0x33/0x40 [ 2578.243317] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2578.243828] RIP: 0033:0x7f3d2b989b19 [ 2578.244206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2578.246058] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2578.246824] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2578.247534] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2578.248256] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2578.248976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2578.249691] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2578.276939] FAULT_INJECTION: forcing a failure. [ 2578.276939] name failslab, interval 1, probability 0, space 0, times 0 [ 2578.278339] CPU: 0 PID: 44483 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2578.279039] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2578.279867] Call Trace: [ 2578.280132] dump_stack+0x107/0x167 [ 2578.280508] should_fail.cold+0x5/0xa [ 2578.280894] ? create_object.isra.0+0x3a/0xa20 [ 2578.281360] should_failslab+0x5/0x20 [ 2578.281744] kmem_cache_alloc+0x5b/0x310 [ 2578.282164] create_object.isra.0+0x3a/0xa20 [ 2578.282607] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2578.283106] __kmalloc_track_caller+0x177/0x370 [ 2578.283575] ? kstrdup_const+0x53/0x80 [ 2578.283961] kstrdup+0x36/0x70 [ 2578.284291] kstrdup_const+0x53/0x80 [ 2578.284666] alloc_vfsmnt+0xb5/0x680 [ 2578.285046] clone_mnt+0x6c/0xce0 [ 2578.285398] copy_tree+0x3b0/0xa60 [ 2578.285765] copy_mnt_ns+0x144/0xa00 [ 2578.286132] ? kmem_cache_alloc+0x2a6/0x310 [ 2578.286573] create_new_namespaces+0xd6/0xb20 [ 2578.287021] copy_namespaces+0x3fb/0x4f0 [ 2578.287436] copy_process+0x385b/0x7800 [ 2578.287839] ? mark_lock+0xf5/0x2df0 [ 2578.288213] ? lock_acquire+0x197/0x470 [ 2578.288627] ? __cleanup_sighand+0xb0/0xb0 [ 2578.289062] ? _copy_from_user+0xfb/0x1b0 [ 2578.289484] kernel_clone+0xe7/0x980 [ 2578.289860] ? lock_acquire+0x197/0x470 [ 2578.290260] ? create_io_thread+0xf0/0xf0 [ 2578.290685] ? ksys_write+0x21a/0x260 [ 2578.291071] ? lock_downgrade+0x6d0/0x6d0 [ 2578.291495] __do_sys_clone3+0x1e5/0x320 [ 2578.291905] ? __do_sys_clone+0x110/0x110 [ 2578.292334] ? rcu_read_lock_any_held+0x75/0xa0 [ 2578.292813] ? vfs_write+0x354/0xa70 [ 2578.293191] ? fput_many+0x2f/0x1a0 [ 2578.293562] ? ksys_write+0x1a9/0x260 [ 2578.293945] ? __ia32_sys_read+0xb0/0xb0 [ 2578.294363] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2578.294891] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2578.295409] ? trace_hardirqs_on+0x5b/0x180 [ 2578.295844] do_syscall_64+0x33/0x40 [ 2578.296221] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2578.296733] RIP: 0033:0x7f7f3dd15b19 [ 2578.297118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2578.298955] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2578.299718] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2578.300446] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2578.301165] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2578.301876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2578.302594] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:34:49 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 91) [ 2578.535085] FAULT_INJECTION: forcing a failure. [ 2578.535085] name failslab, interval 1, probability 0, space 0, times 0 [ 2578.536075] CPU: 0 PID: 44488 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2578.536688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2578.537382] Call Trace: [ 2578.537600] dump_stack+0x107/0x167 [ 2578.537925] should_fail.cold+0x5/0xa [ 2578.538240] should_failslab+0x5/0x20 [ 2578.538577] __kmalloc_track_caller+0x79/0x370 [ 2578.538969] ? kstrdup_const+0x53/0x80 [ 2578.539291] kstrdup+0x36/0x70 [ 2578.539569] kstrdup_const+0x53/0x80 [ 2578.539875] alloc_vfsmnt+0xb5/0x680 [ 2578.540203] clone_mnt+0x6c/0xce0 [ 2578.540504] copy_tree+0x3b0/0xa60 [ 2578.540824] copy_mnt_ns+0x144/0xa00 [ 2578.541147] ? kmem_cache_alloc+0x2a6/0x310 [ 2578.541503] create_new_namespaces+0xd6/0xb20 [ 2578.541904] copy_namespaces+0x3fb/0x4f0 [ 2578.542248] copy_process+0x385b/0x7800 [ 2578.542597] ? mark_lock+0xf5/0x2df0 [ 2578.542925] ? lock_acquire+0x197/0x470 [ 2578.543269] ? __cleanup_sighand+0xb0/0xb0 [ 2578.543640] ? _copy_from_user+0xfb/0x1b0 [ 2578.543994] kernel_clone+0xe7/0x980 [ 2578.544315] ? lock_acquire+0x197/0x470 [ 2578.544658] ? create_io_thread+0xf0/0xf0 [ 2578.545005] ? ksys_write+0x21a/0x260 [ 2578.545329] ? lock_downgrade+0x6d0/0x6d0 [ 2578.545668] __do_sys_clone3+0x1e5/0x320 [ 2578.546031] ? __do_sys_clone+0x110/0x110 [ 2578.546392] ? rcu_read_lock_any_held+0x75/0xa0 [ 2578.546789] ? vfs_write+0x354/0xa70 [ 2578.547092] ? fput_many+0x2f/0x1a0 [ 2578.547406] ? ksys_write+0x1a9/0x260 [ 2578.547731] ? __ia32_sys_read+0xb0/0xb0 [ 2578.548093] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2578.548545] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2578.548965] ? trace_hardirqs_on+0x5b/0x180 [ 2578.549336] do_syscall_64+0x33/0x40 [ 2578.549645] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2578.550094] RIP: 0033:0x7f3d2b989b19 [ 2578.550406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2578.551975] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2578.552621] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2578.553227] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2578.553829] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2578.554432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2578.555047] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:34:49 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 92) [ 2578.731054] FAULT_INJECTION: forcing a failure. [ 2578.731054] name failslab, interval 1, probability 0, space 0, times 0 [ 2578.732937] CPU: 1 PID: 44491 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2578.734037] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2578.735348] Call Trace: [ 2578.735776] dump_stack+0x107/0x167 [ 2578.736359] should_fail.cold+0x5/0xa [ 2578.736982] should_failslab+0x5/0x20 [ 2578.737592] __kmalloc_track_caller+0x79/0x370 [ 2578.738318] ? kstrdup_const+0x53/0x80 [ 2578.738945] kstrdup+0x36/0x70 [ 2578.739461] kstrdup_const+0x53/0x80 [ 2578.740056] alloc_vfsmnt+0xb5/0x680 [ 2578.740667] clone_mnt+0x6c/0xce0 [ 2578.741230] copy_tree+0x3b0/0xa60 [ 2578.741810] copy_mnt_ns+0x144/0xa00 [ 2578.742405] ? kmem_cache_alloc+0x2a6/0x310 [ 2578.743100] create_new_namespaces+0xd6/0xb20 [ 2578.743823] copy_namespaces+0x3fb/0x4f0 [ 2578.744483] copy_process+0x385b/0x7800 [ 2578.745119] ? mark_lock+0xf5/0x2df0 [ 2578.745720] ? lock_acquire+0x197/0x470 [ 2578.746375] ? __cleanup_sighand+0xb0/0xb0 [ 2578.747067] ? _copy_from_user+0xfb/0x1b0 [ 2578.747735] kernel_clone+0xe7/0x980 [ 2578.748329] ? lock_acquire+0x197/0x470 [ 2578.748973] ? create_io_thread+0xf0/0xf0 [ 2578.749650] ? ksys_write+0x21a/0x260 [ 2578.750257] ? lock_downgrade+0x6d0/0x6d0 [ 2578.750923] __do_sys_clone3+0x1e5/0x320 [ 2578.751569] ? __do_sys_clone+0x110/0x110 [ 2578.752253] ? rcu_read_lock_any_held+0x75/0xa0 [ 2578.752999] ? vfs_write+0x354/0xa70 [ 2578.753592] ? fput_many+0x2f/0x1a0 [ 2578.754174] ? ksys_write+0x1a9/0x260 [ 2578.754783] ? __ia32_sys_read+0xb0/0xb0 [ 2578.755437] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2578.756272] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2578.757094] ? trace_hardirqs_on+0x5b/0x180 [ 2578.757787] do_syscall_64+0x33/0x40 [ 2578.758378] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2578.759190] RIP: 0033:0x7f3d2b989b19 [ 2578.759783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2578.762677] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2578.763880] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2578.765013] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2578.766136] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2578.767260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2578.768384] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:35:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:35:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:35:05 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) r3 = getpgrp(0x0) tgkill(r3, r3, 0x0) r4 = getpgrp(0xffffffffffffffff) clone3(&(0x7f0000000400)={0x200000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x2d}, &(0x7f0000000240)=""/126, 0x7e, &(0x7f00000002c0)=""/252, &(0x7f00000003c0)=[r3, r4], 0x2, {r2}}, 0x58) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:35:05 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9", 0x24, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:05 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9", 0x24, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:05 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 87) 08:35:05 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0), 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:05 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 93) [ 2594.507499] FAULT_INJECTION: forcing a failure. [ 2594.507499] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.509469] CPU: 1 PID: 44505 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2594.510512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2594.511752] Call Trace: [ 2594.512158] dump_stack+0x107/0x167 [ 2594.512724] should_fail.cold+0x5/0xa [ 2594.513303] ? create_object.isra.0+0x3a/0xa20 [ 2594.513991] should_failslab+0x5/0x20 [ 2594.514569] kmem_cache_alloc+0x5b/0x310 [ 2594.515198] create_object.isra.0+0x3a/0xa20 [ 2594.515868] kmemleak_alloc_percpu+0xa0/0x100 [ 2594.516545] pcpu_alloc+0x4e2/0x1240 [ 2594.517135] alloc_vfsmnt+0xfd/0x680 [ 2594.517710] clone_mnt+0x6c/0xce0 [ 2594.518248] copy_tree+0x3b0/0xa60 [ 2594.518797] copy_mnt_ns+0x144/0xa00 [ 2594.519359] ? kmem_cache_alloc+0x2a6/0x310 [ 2594.520016] create_new_namespaces+0xd6/0xb20 [ 2594.520792] copy_namespaces+0x3fb/0x4f0 [ 2594.521510] copy_process+0x385b/0x7800 [ 2594.522220] ? mark_lock+0xf5/0x2df0 [ 2594.522883] ? lock_acquire+0x197/0x470 [ 2594.523589] ? __cleanup_sighand+0xb0/0xb0 [ 2594.524355] ? _copy_from_user+0xfb/0x1b0 [ 2594.525093] kernel_clone+0xe7/0x980 [ 2594.525756] ? lock_acquire+0x197/0x470 [ 2594.526455] ? create_io_thread+0xf0/0xf0 [ 2594.527187] ? ksys_write+0x21a/0x260 [ 2594.527859] ? lock_downgrade+0x6d0/0x6d0 [ 2594.528573] __do_sys_clone3+0x1e5/0x320 [ 2594.529299] ? __do_sys_clone+0x110/0x110 [ 2594.530057] ? rcu_read_lock_any_held+0x75/0xa0 [ 2594.530868] ? vfs_write+0x354/0xa70 [ 2594.531524] ? fput_many+0x2f/0x1a0 [ 2594.532166] ? ksys_write+0x1a9/0x260 [ 2594.532871] ? __ia32_sys_read+0xb0/0xb0 [ 2594.533593] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2594.534519] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2594.535422] ? trace_hardirqs_on+0x5b/0x180 [ 2594.536188] do_syscall_64+0x33/0x40 [ 2594.536834] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2594.537722] RIP: 0033:0x7f7f3dd15b19 [ 2594.538353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2594.541536] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2594.542832] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2594.544075] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2594.545320] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2594.546554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2594.547791] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2594.571659] FAULT_INJECTION: forcing a failure. [ 2594.571659] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.573612] CPU: 1 PID: 44511 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2594.574794] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2594.576209] Call Trace: [ 2594.576680] dump_stack+0x107/0x167 [ 2594.577307] should_fail.cold+0x5/0xa [ 2594.577966] ? create_object.isra.0+0x3a/0xa20 [ 2594.578757] should_failslab+0x5/0x20 [ 2594.579411] kmem_cache_alloc+0x5b/0x310 [ 2594.580114] create_object.isra.0+0x3a/0xa20 [ 2594.580884] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2594.581749] __kmalloc_track_caller+0x177/0x370 [ 2594.582523] ? kstrdup_const+0x53/0x80 [ 2594.583199] kstrdup+0x36/0x70 [ 2594.583754] kstrdup_const+0x53/0x80 [ 2594.584390] alloc_vfsmnt+0xb5/0x680 [ 2594.585042] clone_mnt+0x6c/0xce0 [ 2594.585641] copy_tree+0x3b0/0xa60 [ 2594.586261] copy_mnt_ns+0x144/0xa00 [ 2594.586896] ? kmem_cache_alloc+0x2a6/0x310 [ 2594.587635] create_new_namespaces+0xd6/0xb20 [ 2594.588407] copy_namespaces+0x3fb/0x4f0 [ 2594.589110] copy_process+0x385b/0x7800 [ 2594.589764] ? mark_lock+0xf5/0x2df0 [ 2594.590405] ? lock_acquire+0x197/0x470 [ 2594.591096] ? __cleanup_sighand+0xb0/0xb0 [ 2594.591838] ? _copy_from_user+0xfb/0x1b0 [ 2594.592547] kernel_clone+0xe7/0x980 [ 2594.593189] ? lock_acquire+0x197/0x470 [ 2594.593870] ? create_io_thread+0xf0/0xf0 [ 2594.594596] ? ksys_write+0x21a/0x260 [ 2594.595246] ? lock_downgrade+0x6d0/0x6d0 [ 2594.595957] __do_sys_clone3+0x1e5/0x320 [ 2594.596627] ? __do_sys_clone+0x110/0x110 [ 2594.597355] ? rcu_read_lock_any_held+0x75/0xa0 [ 2594.598119] ? vfs_write+0x354/0xa70 [ 2594.598745] ? fput_many+0x2f/0x1a0 [ 2594.599360] ? ksys_write+0x1a9/0x260 [ 2594.600001] ? __ia32_sys_read+0xb0/0xb0 [ 2594.600708] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2594.601589] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2594.602446] ? trace_hardirqs_on+0x5b/0x180 [ 2594.603175] do_syscall_64+0x33/0x40 [ 2594.603809] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2594.604648] RIP: 0033:0x7f3d2b989b19 [ 2594.605283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2594.608367] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2594.609659] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2594.610852] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2594.612037] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2594.613229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2594.614416] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:35:05 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 94) 08:35:06 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 88) [ 2594.976661] FAULT_INJECTION: forcing a failure. [ 2594.976661] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.978741] CPU: 1 PID: 44529 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2594.979713] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2594.980872] Call Trace: [ 2594.981251] dump_stack+0x107/0x167 [ 2594.981771] should_fail.cold+0x5/0xa [ 2594.982312] ? create_object.isra.0+0x3a/0xa20 [ 2594.982960] should_failslab+0x5/0x20 [ 2594.983498] kmem_cache_alloc+0x5b/0x310 [ 2594.984074] ? mark_held_locks+0x9e/0xe0 [ 2594.984661] create_object.isra.0+0x3a/0xa20 [ 2594.985289] kmemleak_alloc_percpu+0xa0/0x100 [ 2594.985921] pcpu_alloc+0x4e2/0x1240 [ 2594.986467] alloc_vfsmnt+0xfd/0x680 [ 2594.986993] clone_mnt+0x6c/0xce0 [ 2594.987492] copy_tree+0x3b0/0xa60 [ 2594.988005] copy_mnt_ns+0x144/0xa00 [ 2594.988532] ? kmem_cache_alloc+0x2a6/0x310 [ 2594.989156] create_new_namespaces+0xd6/0xb20 [ 2594.989789] copy_namespaces+0x3fb/0x4f0 [ 2594.990362] copy_process+0x385b/0x7800 [ 2594.990921] ? mark_lock+0xf5/0x2df0 [ 2594.991451] ? lock_acquire+0x197/0x470 [ 2594.992026] ? __cleanup_sighand+0xb0/0xb0 [ 2594.992643] ? _copy_from_user+0xfb/0x1b0 [ 2594.993234] kernel_clone+0xe7/0x980 [ 2594.993758] ? lock_acquire+0x197/0x470 [ 2594.994314] ? create_io_thread+0xf0/0xf0 [ 2594.994907] ? ksys_write+0x21a/0x260 [ 2594.995436] ? lock_downgrade+0x6d0/0x6d0 [ 2594.996015] __do_sys_clone3+0x1e5/0x320 [ 2594.996576] ? __do_sys_clone+0x110/0x110 [ 2594.997177] ? rcu_read_lock_any_held+0x75/0xa0 [ 2594.997821] ? vfs_write+0x354/0xa70 [ 2594.998338] ? fput_many+0x2f/0x1a0 [ 2594.998846] ? ksys_write+0x1a9/0x260 [ 2594.999372] ? __ia32_sys_read+0xb0/0xb0 [ 2594.999941] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2595.000669] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2595.001378] ? trace_hardirqs_on+0x5b/0x180 [ 2595.001982] do_syscall_64+0x33/0x40 [ 2595.002497] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2595.003208] RIP: 0033:0x7f3d2b989b19 [ 2595.003722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2595.006233] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2595.007264] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2595.008233] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2595.009209] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2595.010173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2595.011144] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2595.151485] FAULT_INJECTION: forcing a failure. [ 2595.151485] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.153013] CPU: 1 PID: 44533 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2595.153793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2595.154807] Call Trace: [ 2595.155142] dump_stack+0x107/0x167 [ 2595.155593] should_fail.cold+0x5/0xa [ 2595.156080] ? create_object.isra.0+0x3a/0xa20 [ 2595.156665] should_failslab+0x5/0x20 [ 2595.157135] kmem_cache_alloc+0x5b/0x310 [ 2595.157650] create_object.isra.0+0x3a/0xa20 [ 2595.158192] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2595.158772] __kmalloc_track_caller+0x177/0x370 [ 2595.159343] ? kstrdup_const+0x53/0x80 [ 2595.159795] kstrdup+0x36/0x70 [ 2595.160198] kstrdup_const+0x53/0x80 [ 2595.160636] alloc_vfsmnt+0xb5/0x680 [ 2595.161098] clone_mnt+0x6c/0xce0 [ 2595.161503] copy_tree+0x3b0/0xa60 [ 2595.161963] copy_mnt_ns+0x144/0xa00 [ 2595.162391] ? kmem_cache_alloc+0x2a6/0x310 [ 2595.162941] create_new_namespaces+0xd6/0xb20 [ 2595.163459] copy_namespaces+0x3fb/0x4f0 [ 2595.163969] copy_process+0x385b/0x7800 [ 2595.164425] ? mark_lock+0xf5/0x2df0 [ 2595.164903] ? lock_acquire+0x197/0x470 [ 2595.165414] ? __cleanup_sighand+0xb0/0xb0 [ 2595.165983] ? _copy_from_user+0xfb/0x1b0 [ 2595.166505] kernel_clone+0xe7/0x980 [ 2595.166966] ? lock_acquire+0x197/0x470 [ 2595.167462] ? create_io_thread+0xf0/0xf0 [ 2595.167994] ? ksys_write+0x21a/0x260 [ 2595.168471] ? lock_downgrade+0x6d0/0x6d0 [ 2595.169008] __do_sys_clone3+0x1e5/0x320 [ 2595.169511] ? __do_sys_clone+0x110/0x110 [ 2595.170059] ? rcu_read_lock_any_held+0x75/0xa0 [ 2595.170587] ? vfs_write+0x354/0xa70 [ 2595.171060] ? fput_many+0x2f/0x1a0 [ 2595.171524] ? ksys_write+0x1a9/0x260 [ 2595.172004] ? __ia32_sys_read+0xb0/0xb0 [ 2595.172536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2595.173145] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2595.173783] ? trace_hardirqs_on+0x5b/0x180 [ 2595.174348] do_syscall_64+0x33/0x40 [ 2595.174817] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2595.175461] RIP: 0033:0x7f7f3dd15b19 [ 2595.175934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2595.178227] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2595.179182] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2595.180081] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2595.180972] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2595.181856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2595.182730] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:35:06 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 95) [ 2595.338590] FAULT_INJECTION: forcing a failure. [ 2595.338590] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.339989] CPU: 1 PID: 44538 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2595.340856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2595.341888] Call Trace: [ 2595.342197] dump_stack+0x107/0x167 [ 2595.342659] should_fail.cold+0x5/0xa [ 2595.343132] ? alloc_vfsmnt+0x23/0x680 [ 2595.343609] should_failslab+0x5/0x20 [ 2595.344078] kmem_cache_alloc+0x5b/0x310 [ 2595.344575] ? copy_tree+0x61a/0xa60 [ 2595.345045] alloc_vfsmnt+0x23/0x680 [ 2595.345511] clone_mnt+0x6c/0xce0 [ 2595.345945] copy_tree+0x3b0/0xa60 [ 2595.346530] copy_mnt_ns+0x144/0xa00 [ 2595.346983] ? kmem_cache_alloc+0x2a6/0x310 [ 2595.347516] create_new_namespaces+0xd6/0xb20 [ 2595.348072] copy_namespaces+0x3fb/0x4f0 [ 2595.348576] copy_process+0x385b/0x7800 [ 2595.349080] ? mark_lock+0xf5/0x2df0 [ 2595.349548] ? lock_acquire+0x197/0x470 [ 2595.350055] ? __cleanup_sighand+0xb0/0xb0 [ 2595.350592] ? _copy_from_user+0xfb/0x1b0 [ 2595.351110] kernel_clone+0xe7/0x980 [ 2595.351563] ? lock_acquire+0x197/0x470 [ 2595.352053] ? create_io_thread+0xf0/0xf0 [ 2595.352577] ? ksys_write+0x21a/0x260 [ 2595.353058] ? lock_downgrade+0x6d0/0x6d0 [ 2595.353578] __do_sys_clone3+0x1e5/0x320 [ 2595.354075] ? __do_sys_clone+0x110/0x110 [ 2595.354787] ? rcu_read_lock_any_held+0x75/0xa0 [ 2595.355353] ? vfs_write+0x354/0xa70 [ 2595.355984] ? fput_many+0x2f/0x1a0 [ 2595.356501] ? ksys_write+0x1a9/0x260 [ 2595.356941] ? __ia32_sys_read+0xb0/0xb0 [ 2595.357452] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2595.358105] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2595.358754] ? trace_hardirqs_on+0x5b/0x180 [ 2595.359292] do_syscall_64+0x33/0x40 [ 2595.359886] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2595.360525] RIP: 0033:0x7f3d2b989b19 [ 2595.360992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2595.363052] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2595.363814] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2595.364527] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2595.365248] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2595.365963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2595.366671] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:35:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:35:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r0, @ANYRES64, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:35:06 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9", 0x24, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:06 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9", 0x24, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:06 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x51412, 0x9, 0x0, 0x0, 0x3, 0xffffffff, 0x4, 0x0, 0x20}, r1, 0x20000000000009, r2, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:35:06 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0), 0x0, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:06 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 96) 08:35:06 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 89) [ 2595.631534] FAULT_INJECTION: forcing a failure. [ 2595.631534] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.632705] CPU: 1 PID: 44566 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2595.633475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2595.634301] Call Trace: [ 2595.634523] dump_stack+0x107/0x167 [ 2595.634822] should_fail.cold+0x5/0xa [ 2595.635134] ? alloc_vfsmnt+0x23/0x680 [ 2595.635474] should_failslab+0x5/0x20 [ 2595.635911] kmem_cache_alloc+0x5b/0x310 [ 2595.636241] ? copy_tree+0x61a/0xa60 [ 2595.636542] alloc_vfsmnt+0x23/0x680 [ 2595.636865] clone_mnt+0x6c/0xce0 [ 2595.637151] copy_tree+0x3b0/0xa60 [ 2595.637447] copy_mnt_ns+0x144/0xa00 [ 2595.637750] ? kmem_cache_alloc+0x2a6/0x310 [ 2595.638105] create_new_namespaces+0xd6/0xb20 [ 2595.638473] copy_namespaces+0x3fb/0x4f0 [ 2595.638963] copy_process+0x385b/0x7800 [ 2595.639289] ? mark_lock+0xf5/0x2df0 [ 2595.639781] ? lock_acquire+0x197/0x470 [ 2595.640245] ? __cleanup_sighand+0xb0/0xb0 [ 2595.640600] ? _copy_from_user+0xfb/0x1b0 [ 2595.640946] kernel_clone+0xe7/0x980 [ 2595.641244] ? lock_acquire+0x197/0x470 [ 2595.641565] ? create_io_thread+0xf0/0xf0 [ 2595.641912] ? ksys_write+0x21a/0x260 [ 2595.642220] ? lock_downgrade+0x6d0/0x6d0 [ 2595.642561] __do_sys_clone3+0x1e5/0x320 [ 2595.642896] ? __do_sys_clone+0x110/0x110 [ 2595.643251] ? rcu_read_lock_any_held+0x75/0xa0 [ 2595.643774] ? vfs_write+0x354/0xa70 [ 2595.644083] ? fput_many+0x2f/0x1a0 [ 2595.644377] ? ksys_write+0x1a9/0x260 [ 2595.644688] ? __ia32_sys_read+0xb0/0xb0 [ 2595.645022] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2595.645445] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2595.645856] ? trace_hardirqs_on+0x5b/0x180 [ 2595.646210] do_syscall_64+0x33/0x40 [ 2595.646511] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2595.646925] RIP: 0033:0x7f3d2b989b19 [ 2595.647228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2595.648723] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2595.649331] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2595.649899] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2595.650468] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2595.651038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2595.651608] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2595.678188] FAULT_INJECTION: forcing a failure. [ 2595.678188] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.679154] CPU: 1 PID: 44568 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2595.679862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2595.680532] Call Trace: [ 2595.680751] dump_stack+0x107/0x167 [ 2595.681049] should_fail.cold+0x5/0xa [ 2595.681353] ? alloc_vfsmnt+0x23/0x680 [ 2595.681660] should_failslab+0x5/0x20 [ 2595.681965] kmem_cache_alloc+0x5b/0x310 [ 2595.682285] ? copy_tree+0x61a/0xa60 [ 2595.682586] alloc_vfsmnt+0x23/0x680 [ 2595.682886] clone_mnt+0x6c/0xce0 [ 2595.683167] copy_tree+0x3b0/0xa60 [ 2595.683462] copy_mnt_ns+0x144/0xa00 [ 2595.683764] ? kmem_cache_alloc+0x2a6/0x310 [ 2595.684114] create_new_namespaces+0xd6/0xb20 [ 2595.684632] copy_namespaces+0x3fb/0x4f0 [ 2595.684959] copy_process+0x385b/0x7800 [ 2595.685406] ? mark_lock+0xf5/0x2df0 [ 2595.685884] ? lock_acquire+0x197/0x470 [ 2595.686214] ? __cleanup_sighand+0xb0/0xb0 [ 2595.686554] ? _copy_from_user+0xfb/0x1b0 [ 2595.686924] kernel_clone+0xe7/0x980 [ 2595.687277] ? lock_acquire+0x197/0x470 [ 2595.687641] ? create_io_thread+0xf0/0xf0 [ 2595.688076] ? ksys_write+0x21a/0x260 [ 2595.688409] ? lock_downgrade+0x6d0/0x6d0 [ 2595.688838] __do_sys_clone3+0x1e5/0x320 [ 2595.689156] ? __do_sys_clone+0x110/0x110 [ 2595.689510] ? rcu_read_lock_any_held+0x75/0xa0 [ 2595.689874] ? vfs_write+0x354/0xa70 [ 2595.690175] ? fput_many+0x2f/0x1a0 [ 2595.690463] ? ksys_write+0x1a9/0x260 [ 2595.690774] ? __ia32_sys_read+0xb0/0xb0 [ 2595.691096] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2595.691651] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2595.692064] ? trace_hardirqs_on+0x5b/0x180 [ 2595.692438] do_syscall_64+0x33/0x40 [ 2595.692857] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2595.693361] RIP: 0033:0x7f7f3dd15b19 [ 2595.693659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2595.695228] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2595.695960] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2595.696727] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2595.697373] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2595.697935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2595.698502] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:35:06 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 97) 08:35:06 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 90) [ 2595.931541] FAULT_INJECTION: forcing a failure. [ 2595.931541] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.933495] CPU: 0 PID: 44571 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2595.934542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2595.935793] Call Trace: [ 2595.936199] dump_stack+0x107/0x167 [ 2595.936763] should_fail.cold+0x5/0xa [ 2595.937350] should_failslab+0x5/0x20 [ 2595.937922] __kmalloc_track_caller+0x79/0x370 [ 2595.938604] ? kstrdup_const+0x53/0x80 [ 2595.939195] kstrdup+0x36/0x70 [ 2595.939683] kstrdup_const+0x53/0x80 [ 2595.940240] alloc_vfsmnt+0xb5/0x680 [ 2595.940809] clone_mnt+0x6c/0xce0 [ 2595.941340] copy_tree+0x3b0/0xa60 [ 2595.941889] copy_mnt_ns+0x144/0xa00 [ 2595.942455] ? kmem_cache_alloc+0x2a6/0x310 [ 2595.943110] create_new_namespaces+0xd6/0xb20 [ 2595.943793] copy_namespaces+0x3fb/0x4f0 [ 2595.944409] copy_process+0x385b/0x7800 [ 2595.945018] ? mark_lock+0xf5/0x2df0 [ 2595.945589] ? lock_acquire+0x197/0x470 [ 2595.946206] ? __cleanup_sighand+0xb0/0xb0 [ 2595.946857] ? _copy_from_user+0xfb/0x1b0 [ 2595.947488] kernel_clone+0xe7/0x980 [ 2595.948049] ? lock_acquire+0x197/0x470 [ 2595.948656] ? create_io_thread+0xf0/0xf0 [ 2595.949297] ? ksys_write+0x21a/0x260 [ 2595.949870] ? lock_downgrade+0x6d0/0x6d0 [ 2595.950498] __do_sys_clone3+0x1e5/0x320 [ 2595.951108] ? __do_sys_clone+0x110/0x110 [ 2595.951762] ? rcu_read_lock_any_held+0x75/0xa0 [ 2595.952458] ? vfs_write+0x354/0xa70 [ 2595.953027] ? fput_many+0x2f/0x1a0 [ 2595.953577] ? ksys_write+0x1a9/0x260 [ 2595.954151] ? __ia32_sys_read+0xb0/0xb0 [ 2595.954772] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2595.955604] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2595.956505] ? trace_hardirqs_on+0x5b/0x180 [ 2595.957275] do_syscall_64+0x33/0x40 [ 2595.957929] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2595.958824] RIP: 0033:0x7f3d2b989b19 [ 2595.959476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2595.962659] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2595.963980] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2595.965224] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2595.966461] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2595.967706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2595.968951] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 [ 2596.000290] FAULT_INJECTION: forcing a failure. [ 2596.000290] name failslab, interval 1, probability 0, space 0, times 0 [ 2596.001432] CPU: 1 PID: 44573 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2596.001994] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2596.002646] Call Trace: [ 2596.002865] dump_stack+0x107/0x167 [ 2596.003161] should_fail.cold+0x5/0xa [ 2596.003484] ? create_object.isra.0+0x3a/0xa20 [ 2596.003856] should_failslab+0x5/0x20 [ 2596.004161] kmem_cache_alloc+0x5b/0x310 [ 2596.004484] ? find_held_lock+0x2c/0x110 [ 2596.004817] create_object.isra.0+0x3a/0xa20 [ 2596.005175] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2596.005579] kmem_cache_alloc+0x159/0x310 [ 2596.005923] alloc_vfsmnt+0x23/0x680 [ 2596.006224] clone_mnt+0x6c/0xce0 [ 2596.006508] copy_tree+0x3b0/0xa60 [ 2596.006801] copy_mnt_ns+0x144/0xa00 [ 2596.007100] ? kmem_cache_alloc+0x2a6/0x310 [ 2596.007452] create_new_namespaces+0xd6/0xb20 [ 2596.007818] copy_namespaces+0x3fb/0x4f0 [ 2596.008147] copy_process+0x385b/0x7800 [ 2596.008467] ? mark_lock+0xf5/0x2df0 [ 2596.008774] ? lock_acquire+0x197/0x470 [ 2596.009105] ? __cleanup_sighand+0xb0/0xb0 [ 2596.009456] ? _copy_from_user+0xfb/0x1b0 [ 2596.009793] kernel_clone+0xe7/0x980 [ 2596.010090] ? lock_acquire+0x197/0x470 [ 2596.010408] ? create_io_thread+0xf0/0xf0 [ 2596.010758] ? ksys_write+0x21a/0x260 [ 2596.011062] ? lock_downgrade+0x6d0/0x6d0 [ 2596.011393] __do_sys_clone3+0x1e5/0x320 [ 2596.011718] ? __do_sys_clone+0x110/0x110 [ 2596.012065] ? rcu_read_lock_any_held+0x75/0xa0 [ 2596.012437] ? vfs_write+0x354/0xa70 [ 2596.012759] ? fput_many+0x2f/0x1a0 [ 2596.013051] ? ksys_write+0x1a9/0x260 [ 2596.013353] ? __ia32_sys_read+0xb0/0xb0 [ 2596.013685] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2596.014107] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2596.014515] ? trace_hardirqs_on+0x5b/0x180 [ 2596.014863] do_syscall_64+0x33/0x40 [ 2596.015162] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2596.015568] RIP: 0033:0x7f7f3dd15b19 [ 2596.015868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2596.017332] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2596.017941] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2596.018501] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2596.019062] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2596.019631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2596.020190] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:35:07 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 98) 08:35:07 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb178", 0x15, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2596.136223] FAULT_INJECTION: forcing a failure. [ 2596.136223] name failslab, interval 1, probability 0, space 0, times 0 [ 2596.137175] CPU: 1 PID: 44575 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2596.137724] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2596.138378] Call Trace: [ 2596.138599] dump_stack+0x107/0x167 [ 2596.138901] should_fail.cold+0x5/0xa [ 2596.139210] should_failslab+0x5/0x20 [ 2596.139516] __kmalloc_track_caller+0x79/0x370 [ 2596.139880] ? kstrdup_const+0x53/0x80 [ 2596.140194] kstrdup+0x36/0x70 [ 2596.140451] kstrdup_const+0x53/0x80 [ 2596.140758] alloc_vfsmnt+0xb5/0x680 [ 2596.141053] clone_mnt+0x6c/0xce0 [ 2596.141336] copy_tree+0x3b0/0xa60 [ 2596.141627] copy_mnt_ns+0x144/0xa00 [ 2596.141926] ? kmem_cache_alloc+0x2a6/0x310 [ 2596.142282] create_new_namespaces+0xd6/0xb20 [ 2596.142652] copy_namespaces+0x3fb/0x4f0 [ 2596.142989] copy_process+0x385b/0x7800 [ 2596.143311] ? mark_lock+0xf5/0x2df0 [ 2596.143613] ? lock_acquire+0x197/0x470 [ 2596.143941] ? __cleanup_sighand+0xb0/0xb0 [ 2596.144296] ? _copy_from_user+0xfb/0x1b0 [ 2596.144642] kernel_clone+0xe7/0x980 [ 2596.144944] ? lock_acquire+0x197/0x470 [ 2596.145263] ? create_io_thread+0xf0/0xf0 [ 2596.145611] ? ksys_write+0x21a/0x260 [ 2596.145927] ? lock_downgrade+0x6d0/0x6d0 [ 2596.146257] __do_sys_clone3+0x1e5/0x320 [ 2596.146584] ? __do_sys_clone+0x110/0x110 [ 2596.146930] ? rcu_read_lock_any_held+0x75/0xa0 [ 2596.147298] ? vfs_write+0x354/0xa70 [ 2596.147597] ? fput_many+0x2f/0x1a0 [ 2596.147891] ? ksys_write+0x1a9/0x260 [ 2596.148193] ? __ia32_sys_read+0xb0/0xb0 [ 2596.148521] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2596.148948] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2596.149355] ? trace_hardirqs_on+0x5b/0x180 [ 2596.149710] do_syscall_64+0x33/0x40 [ 2596.150009] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2596.150414] RIP: 0033:0x7f3d2b989b19 [ 2596.150716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2596.152167] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2596.152775] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2596.153339] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2596.153902] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2596.154462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2596.155030] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:35:07 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9", 0x24, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:22 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 91) 08:35:22 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22c", 0x27, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:22 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22c", 0x27, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2611.914186] FAULT_INJECTION: forcing a failure. [ 2611.914186] name failslab, interval 1, probability 0, space 0, times 0 [ 2611.915131] CPU: 1 PID: 44602 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2611.915676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2611.916320] Call Trace: [ 2611.916536] dump_stack+0x107/0x167 [ 2611.916835] should_fail.cold+0x5/0xa [ 2611.917144] should_failslab+0x5/0x20 [ 2611.917449] __kmalloc_track_caller+0x79/0x370 [ 2611.917813] ? kstrdup_const+0x53/0x80 [ 2611.918125] kstrdup+0x36/0x70 [ 2611.918383] kstrdup_const+0x53/0x80 [ 2611.918680] alloc_vfsmnt+0xb5/0x680 [ 2611.918980] clone_mnt+0x6c/0xce0 [ 2611.919262] copy_tree+0x3b0/0xa60 [ 2611.919552] copy_mnt_ns+0x144/0xa00 [ 2611.919855] ? kmem_cache_alloc+0x2a6/0x310 [ 2611.920203] create_new_namespaces+0xd6/0xb20 [ 2611.920563] copy_namespaces+0x3fb/0x4f0 [ 2611.920898] copy_process+0x385b/0x7800 [ 2611.921212] ? mark_lock+0xf5/0x2df0 [ 2611.921746] ? lock_acquire+0x197/0x470 [ 2611.922076] ? __cleanup_sighand+0xb0/0xb0 [ 2611.922573] ? _copy_from_user+0xfb/0x1b0 08:35:22 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb178", 0x15, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:35:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:35:22 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = io_uring_setup(0x79fc, &(0x7f00000000c0)={0x0, 0xaf71, 0x4, 0x0, 0x2df}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0xfffffff8, 0xffffffffffff0001, 0x3ff, 0x9, 0x4, 0xf7}) r2 = getpgrp(0x0) tgkill(r2, r2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x3, 0xff, 0x6, 0x8, 0x0, 0x100000000, 0x402, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x7}, 0x2, 0xd, 0x0, 0x4, 0x3, 0x7, 0x7, 0x0, 0x20, 0x0, 0x7}, r2, 0x9, r3, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:35:22 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 99) [ 2611.922914] kernel_clone+0xe7/0x980 [ 2611.923334] ? lock_acquire+0x197/0x470 [ 2611.923652] ? create_io_thread+0xf0/0xf0 [ 2611.923992] ? ksys_write+0x21a/0x260 [ 2611.924295] ? lock_downgrade+0x6d0/0x6d0 [ 2611.924628] __do_sys_clone3+0x1e5/0x320 [ 2611.924968] ? __do_sys_clone+0x110/0x110 [ 2611.925308] ? rcu_read_lock_any_held+0x75/0xa0 [ 2611.925674] ? vfs_write+0x354/0xa70 [ 2611.925969] ? fput_many+0x2f/0x1a0 [ 2611.926256] ? ksys_write+0x1a9/0x260 [ 2611.926559] ? __ia32_sys_read+0xb0/0xb0 [ 2611.926881] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2611.927295] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2611.927699] ? trace_hardirqs_on+0x5b/0x180 [ 2611.928048] do_syscall_64+0x33/0x40 [ 2611.928343] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2611.928754] RIP: 0033:0x7f7f3dd15b19 [ 2611.929053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2611.930489] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2611.931086] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2611.931648] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2611.932207] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2611.932759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2611.933317] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2611.940542] FAULT_INJECTION: forcing a failure. [ 2611.940542] name failslab, interval 1, probability 0, space 0, times 0 [ 2611.941460] CPU: 1 PID: 44608 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2611.942008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2611.942661] Call Trace: [ 2611.942872] dump_stack+0x107/0x167 [ 2611.943161] should_fail.cold+0x5/0xa [ 2611.943480] ? create_object.isra.0+0x3a/0xa20 [ 2611.943844] should_failslab+0x5/0x20 [ 2611.944150] kmem_cache_alloc+0x5b/0x310 [ 2611.944475] create_object.isra.0+0x3a/0xa20 [ 2611.944841] kmemleak_alloc_percpu+0xa0/0x100 [ 2611.945202] pcpu_alloc+0x4e2/0x1240 [ 2611.945509] alloc_vfsmnt+0xfd/0x680 [ 2611.945811] clone_mnt+0x6c/0xce0 [ 2611.946094] copy_tree+0x3b0/0xa60 [ 2611.946386] copy_mnt_ns+0x144/0xa00 [ 2611.946684] ? kmem_cache_alloc+0x2a6/0x310 [ 2611.947033] create_new_namespaces+0xd6/0xb20 [ 2611.947396] copy_namespaces+0x3fb/0x4f0 [ 2611.947728] copy_process+0x385b/0x7800 [ 2611.948045] ? mark_lock+0xf5/0x2df0 [ 2611.948348] ? lock_acquire+0x197/0x470 [ 2611.948673] ? __cleanup_sighand+0xb0/0xb0 [ 2611.949026] ? _copy_from_user+0xfb/0x1b0 [ 2611.949365] kernel_clone+0xe7/0x980 [ 2611.949661] ? lock_acquire+0x197/0x470 [ 2611.949978] ? create_io_thread+0xf0/0xf0 [ 2611.950315] ? ksys_write+0x21a/0x260 [ 2611.950619] ? lock_downgrade+0x6d0/0x6d0 [ 2611.950953] __do_sys_clone3+0x1e5/0x320 [ 2611.951273] ? __do_sys_clone+0x110/0x110 [ 2611.951616] ? rcu_read_lock_any_held+0x75/0xa0 [ 2611.951986] ? vfs_write+0x354/0xa70 [ 2611.952281] ? fput_many+0x2f/0x1a0 [ 2611.952571] ? ksys_write+0x1a9/0x260 [ 2611.952883] ? __ia32_sys_read+0xb0/0xb0 [ 2611.953205] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2611.953622] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2611.954030] ? trace_hardirqs_on+0x5b/0x180 [ 2611.954374] do_syscall_64+0x33/0x40 [ 2611.954666] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2611.955076] RIP: 0033:0x7f3d2b989b19 [ 2611.955377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2611.956824] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2611.957425] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2611.957985] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2611.958541] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2611.959098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2611.959644] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:35:23 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 92) 08:35:23 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 100) [ 2612.165606] FAULT_INJECTION: forcing a failure. [ 2612.165606] name failslab, interval 1, probability 0, space 0, times 0 [ 2612.166944] CPU: 1 PID: 44622 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2612.167487] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2612.168140] Call Trace: [ 2612.168355] dump_stack+0x107/0x167 [ 2612.168645] should_fail.cold+0x5/0xa [ 2612.168957] ? create_object.isra.0+0x3a/0xa20 [ 2612.169321] should_failslab+0x5/0x20 [ 2612.169622] kmem_cache_alloc+0x5b/0x310 [ 2612.169947] create_object.isra.0+0x3a/0xa20 [ 2612.170296] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2612.170698] __kmalloc_track_caller+0x177/0x370 [ 2612.171062] ? kstrdup_const+0x53/0x80 [ 2612.171374] kstrdup+0x36/0x70 [ 2612.171636] kstrdup_const+0x53/0x80 [ 2612.171932] alloc_vfsmnt+0xb5/0x680 [ 2612.172230] clone_mnt+0x6c/0xce0 [ 2612.172517] copy_tree+0x3b0/0xa60 [ 2612.172816] copy_mnt_ns+0x144/0xa00 [ 2612.173116] ? kmem_cache_alloc+0x2a6/0x310 [ 2612.173464] create_new_namespaces+0xd6/0xb20 [ 2612.173823] copy_namespaces+0x3fb/0x4f0 [ 2612.174151] copy_process+0x385b/0x7800 [ 2612.174471] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2612.174885] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2612.175317] ? lock_acquire+0x197/0x470 [ 2612.175643] ? __cleanup_sighand+0xb0/0xb0 [ 2612.175996] ? _copy_from_user+0xfb/0x1b0 [ 2612.176332] kernel_clone+0xe7/0x980 [ 2612.176631] ? lock_acquire+0x197/0x470 [ 2612.176954] ? create_io_thread+0xf0/0xf0 [ 2612.177292] ? ksys_write+0x21a/0x260 [ 2612.177597] ? lock_downgrade+0x6d0/0x6d0 [ 2612.177931] __do_sys_clone3+0x1e5/0x320 [ 2612.178250] ? __do_sys_clone+0x110/0x110 [ 2612.178590] ? rcu_read_lock_any_held+0x75/0xa0 [ 2612.178960] ? vfs_write+0x354/0xa70 [ 2612.179257] ? fput_many+0x2f/0x1a0 [ 2612.179550] ? ksys_write+0x1a9/0x260 [ 2612.179852] ? __ia32_sys_read+0xb0/0xb0 [ 2612.180178] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2612.180595] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2612.181008] ? trace_hardirqs_on+0x5b/0x180 [ 2612.181355] do_syscall_64+0x33/0x40 [ 2612.181644] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2612.182050] RIP: 0033:0x7f7f3dd15b19 [ 2612.182349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2612.183791] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2612.184386] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2612.184951] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2612.185512] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2612.186072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2612.186628] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 [ 2612.292931] FAULT_INJECTION: forcing a failure. [ 2612.292931] name failslab, interval 1, probability 0, space 0, times 0 [ 2612.293860] CPU: 1 PID: 44625 Comm: syz-executor.6 Not tainted 5.10.211 #1 [ 2612.294414] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2612.295069] Call Trace: [ 2612.295286] dump_stack+0x107/0x167 [ 2612.295576] should_fail.cold+0x5/0xa [ 2612.295882] ? create_object.isra.0+0x3a/0xa20 [ 2612.296247] should_failslab+0x5/0x20 [ 2612.296553] kmem_cache_alloc+0x5b/0x310 [ 2612.296887] ? mark_held_locks+0x9e/0xe0 [ 2612.297219] create_object.isra.0+0x3a/0xa20 [ 2612.297575] kmemleak_alloc_percpu+0xa0/0x100 [ 2612.297940] pcpu_alloc+0x4e2/0x1240 [ 2612.298251] alloc_vfsmnt+0xfd/0x680 [ 2612.298550] clone_mnt+0x6c/0xce0 [ 2612.298839] copy_tree+0x3b0/0xa60 [ 2612.299132] copy_mnt_ns+0x144/0xa00 [ 2612.299433] ? kmem_cache_alloc+0x2a6/0x310 [ 2612.299780] create_new_namespaces+0xd6/0xb20 [ 2612.300146] copy_namespaces+0x3fb/0x4f0 [ 2612.300471] copy_process+0x385b/0x7800 [ 2612.300791] ? mark_lock+0xf5/0x2df0 [ 2612.301101] ? lock_acquire+0x197/0x470 [ 2612.301432] ? __cleanup_sighand+0xb0/0xb0 [ 2612.301781] ? _copy_from_user+0xfb/0x1b0 [ 2612.302113] kernel_clone+0xe7/0x980 [ 2612.302413] ? lock_acquire+0x197/0x470 [ 2612.302728] ? create_io_thread+0xf0/0xf0 [ 2612.303062] ? ksys_write+0x21a/0x260 [ 2612.303363] ? lock_downgrade+0x6d0/0x6d0 [ 2612.303697] __do_sys_clone3+0x1e5/0x320 [ 2612.304021] ? __do_sys_clone+0x110/0x110 [ 2612.304367] ? rcu_read_lock_any_held+0x75/0xa0 [ 2612.304744] ? vfs_write+0x354/0xa70 [ 2612.305047] ? fput_many+0x2f/0x1a0 [ 2612.305343] ? ksys_write+0x1a9/0x260 [ 2612.305643] ? __ia32_sys_read+0xb0/0xb0 [ 2612.305967] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2612.306378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2612.306792] ? trace_hardirqs_on+0x5b/0x180 [ 2612.307145] do_syscall_64+0x33/0x40 [ 2612.307443] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2612.307849] RIP: 0033:0x7f3d2b989b19 [ 2612.308153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2612.309586] RSP: 002b:00007f3d28eff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2612.310186] RAX: ffffffffffffffda RBX: 00007f3d2ba9cf60 RCX: 00007f3d2b989b19 [ 2612.310746] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2612.311305] RBP: 00007f3d28eff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2612.311868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2612.312424] R13: 00007ffcabe9c45f R14: 00007f3d28eff300 R15: 0000000000022000 08:35:23 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 93) 08:35:23 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:35:23 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22c", 0x27, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:23 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb178", 0x15, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2612.574935] FAULT_INJECTION: forcing a failure. [ 2612.574935] name failslab, interval 1, probability 0, space 0, times 0 [ 2612.576077] CPU: 1 PID: 44633 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2612.576626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2612.577282] Call Trace: [ 2612.577497] dump_stack+0x107/0x167 [ 2612.577791] should_fail.cold+0x5/0xa [ 2612.578093] ? create_object.isra.0+0x3a/0xa20 [ 2612.578455] ? create_object.isra.0+0x3a/0xa20 [ 2612.578822] should_failslab+0x5/0x20 [ 2612.579121] kmem_cache_alloc+0x5b/0x310 [ 2612.579449] create_object.isra.0+0x3a/0xa20 [ 2612.579810] kmemleak_alloc_percpu+0xa0/0x100 [ 2612.580172] pcpu_alloc+0x4e2/0x1240 [ 2612.580484] alloc_vfsmnt+0xfd/0x680 [ 2612.580780] clone_mnt+0x6c/0xce0 [ 2612.581072] copy_tree+0x3b0/0xa60 [ 2612.581360] copy_mnt_ns+0x144/0xa00 [ 2612.581661] ? kmem_cache_alloc+0x2a6/0x310 [ 2612.582012] create_new_namespaces+0xd6/0xb20 [ 2612.582371] copy_namespaces+0x3fb/0x4f0 [ 2612.582696] copy_process+0x385b/0x7800 [ 2612.583020] ? mark_lock+0xf5/0x2df0 [ 2612.583322] ? lock_acquire+0x197/0x470 [ 2612.583654] ? __cleanup_sighand+0xb0/0xb0 [ 2612.584005] ? _copy_from_user+0xfb/0x1b0 [ 2612.584340] kernel_clone+0xe7/0x980 [ 2612.584633] ? lock_acquire+0x197/0x470 [ 2612.584958] ? create_io_thread+0xf0/0xf0 [ 2612.585297] ? ksys_write+0x21a/0x260 [ 2612.585596] ? lock_downgrade+0x6d0/0x6d0 [ 2612.585928] __do_sys_clone3+0x1e5/0x320 [ 2612.586251] ? __do_sys_clone+0x110/0x110 [ 2612.586602] ? rcu_read_lock_any_held+0x75/0xa0 [ 2612.586976] ? vfs_write+0x354/0xa70 [ 2612.587275] ? fput_many+0x2f/0x1a0 [ 2612.587568] ? ksys_write+0x1a9/0x260 [ 2612.587873] ? __ia32_sys_read+0xb0/0xb0 [ 2612.588200] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2612.588615] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2612.589023] ? trace_hardirqs_on+0x5b/0x180 [ 2612.589372] do_syscall_64+0x33/0x40 [ 2612.589671] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2612.590079] RIP: 0033:0x7f7f3dd15b19 [ 2612.590374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2612.591821] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2612.592411] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2612.592984] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2612.593550] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2612.594116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2612.594677] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:35:23 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22c", 0x27, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:23 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x174120004, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:35:40 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r2 = getpgrp(0x0) tgkill(r2, r2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r2, 0x9, r4, 0x3) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x16}, 0x1}, 0xe) sendmmsg(r1, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x10000, 0x0) fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) 08:35:40 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22c", 0x27, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:40 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841", 0x1f, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:40 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 94) 08:35:40 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c502, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:35:40 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22c", 0x27, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:35:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) [ 2629.885989] FAULT_INJECTION: forcing a failure. [ 2629.885989] name failslab, interval 1, probability 0, space 0, times 0 [ 2629.888169] CPU: 1 PID: 44762 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2629.889413] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2629.890821] Call Trace: [ 2629.891282] dump_stack+0x107/0x167 [ 2629.891912] should_fail.cold+0x5/0xa [ 2629.892635] ? create_object.isra.0+0x3a/0xa20 [ 2629.893396] should_failslab+0x5/0x20 [ 2629.893797] kmem_cache_alloc+0x5b/0x310 [ 2629.894225] ? mark_held_locks+0x9e/0xe0 [ 2629.894654] create_object.isra.0+0x3a/0xa20 [ 2629.895127] kmemleak_alloc_percpu+0xa0/0x100 [ 2629.895604] pcpu_alloc+0x4e2/0x1240 [ 2629.896015] alloc_vfsmnt+0xfd/0x680 [ 2629.896445] clone_mnt+0x6c/0xce0 [ 2629.896826] copy_tree+0x3b0/0xa60 [ 2629.897223] copy_mnt_ns+0x144/0xa00 [ 2629.897592] ? kmem_cache_alloc+0x2a6/0x310 [ 2629.898003] create_new_namespaces+0xd6/0xb20 [ 2629.898436] copy_namespaces+0x3fb/0x4f0 [ 2629.898821] copy_process+0x385b/0x7800 [ 2629.899196] ? mark_lock+0xf5/0x2df0 [ 2629.899552] ? lock_acquire+0x197/0x470 [ 2629.899937] ? __cleanup_sighand+0xb0/0xb0 [ 2629.900375] ? _copy_from_user+0xfb/0x1b0 [ 2629.900773] kernel_clone+0xe7/0x980 [ 2629.901136] ? lock_acquire+0x197/0x470 [ 2629.901514] ? create_io_thread+0xf0/0xf0 [ 2629.901913] ? ksys_write+0x21a/0x260 [ 2629.902273] ? lock_downgrade+0x6d0/0x6d0 [ 2629.902667] __do_sys_clone3+0x1e5/0x320 [ 2629.903051] ? __do_sys_clone+0x110/0x110 [ 2629.903453] ? rcu_read_lock_any_held+0x75/0xa0 [ 2629.903890] ? vfs_write+0x354/0xa70 [ 2629.904273] ? fput_many+0x2f/0x1a0 [ 2629.904619] ? ksys_write+0x1a9/0x260 [ 2629.904980] ? __ia32_sys_read+0xb0/0xb0 [ 2629.905376] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2629.905870] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2629.906351] ? trace_hardirqs_on+0x5b/0x180 [ 2629.906762] do_syscall_64+0x33/0x40 [ 2629.907118] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2629.907599] RIP: 0033:0x7f7f3dd15b19 [ 2629.907952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2629.909699] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2629.910417] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2629.911081] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2629.911747] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2629.912442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2629.913121] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:35:40 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000002040), 0x101801, 0x0) sendfile(r2, r0, &(0x7f0000002080)=0x7, 0x8) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x822, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x6, 0x0, 0x20}, r1, 0x9, r4, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) r5 = getpgrp(0x0) tgkill(r5, r5, 0x0) write$cgroup_pid(r3, &(0x7f0000000180)=r5, 0x12) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) sendmmsg$inet6(r4, &(0x7f0000001f80)=[{{&(0x7f00000001c0)={0xa, 0x4e22, 0x6, @private0, 0x3006}, 0x1c, &(0x7f00000008c0)=[{&(0x7f0000000200)="b1c04d580bd3de27d68ec9b1ca555a8ff5c15e6a262c019ab83b6f46223fbffa277b473b2dffdc1e7a6730b9be624e2395ec16326a2ef22273246e8c07c974c22399b8145c00bb038270cef41de22fd4031941f1d5244bdf05e8c0f08b8bed2e1809e0231906e50f7cc333883e85b337d89643ce5995db153abcc2eb093e351018eb3be1fa52bc85fab1191d71a4cfcdd409e6ae3a08257ab52c27dc9fd912fa069bd3b1b9f29242fd4fac05d76daa3825448cc0f6e361e9d2e9228fa551ee07886322776ca2c5c7754bfb607fc462e63accaabe33303e6da53a3bb8c53dec2a218b6b590336a885de3cc452003a0c734c8126c652", 0xf5}, {&(0x7f0000000300)="7da1da1448441bb03265588bde93173d3adb6f5ed13476f90276d4178e062a3165922a73af4c7c56801e50cb8a89590c053935a5f504109f1cee819f5f2f6c5391d5ff7aa493c8d7673be099c4dae93bdaf8be2c54122954be07aeb66469d148927db8605a8b2b295306a3a3d24dd89a7228e1dc2088521ee70b8198036e124c2f34bf45ed4ad0a2d16c139e6f894aa03981c8365fb245bc2fdc27258a1b9b8f71dc5a28d9b8b48288b9604c4c89f41c90b6ad7376836a4f5382c8ae75", 0xbd}, {&(0x7f00000003c0)="2cb9a2b3626bf099152d59e1e0e74d7187934fcd62ddff528cbdef83ad0609957802cb5b21fb281f3dd6e46daec2d4625eb493847535d3df38d07916a77b4dce1ea8d1b2c7a1e76ffdbb3f10e648213a777062e0bac5c1a67c867dfe540d014aec607d3c50b804933eccd982e38c5cc04553296409075fdf0f97efcf6cf8d162087527bff0c3d0dd22ef14d3c3ef69cec11ad764d409cad3b032f5f3411d786a82434b418f0608da140c5fb98a4390a7d75b2f82b5b51a21ebb2", 0xba}, {&(0x7f0000000500)="d4e790d6e26f041cdf827a9a2e46af97df8c8cb45fee7ea73c6e668fe89e7dcc62abbdc5a80ed0ffd3756856e8f18325461e1eff3fd0770b098db79bc9ab35719768f90451a738fe64b2825933a6e1b45a90697e5f41e13815a3c83059fcb277bcfd872e4a7e580c98ee183dc79eead66a8c044691203d00f0c9fc2824851f76d43d8a8e8691325e882fd97a0c82320939be4a1ecbada92071d90cb3897c35f34732f4239aff0732a8cd49099ffdeaa119d47695e7c1fd01b39e3f5fe88b0cb222f902fb800beea1f531806b7bf1f206", 0xd0}, {&(0x7f0000000600)="9ecdc728fafd371c5e49b6679599ace7709c2f1fa9f0b9fd3908bdd386585bb245f2a11d7506000b51e923eec0b474f63a01cfdecf320b9b403b7efc5329e1ecca0b8865082c7f9f691bcea6de04321e62b3da92117014d5a16f826257b59e86b583d462e228273370049f55edf68fb19bb7a02b033632e1be3e6c7d824932db22e62ec7c051829a8edaccaa50c7a6c09e3da52f2b08b8753543f76b3cc25c3609f680de0b51541ef465ed290671f9fd", 0xb0}, {&(0x7f00000006c0)="f9f6b47251b58871d1a86af0cd403bf907b6c9d8825c42baf7b3f7f4ea03c07e1014100bee3a0d6b5c1c40b9b987726861e532fb5907f923abf1aaaf4d796143e2f929d3dc15435639ce878458b78e05812474d46a51e491986e53e39c5870808fc9e16d34d89d5a9cafb6d42457d37de9e56a973683b70711e087a24713c32ef2d67a993ed72a6c077b1d75b94a6365d8e52e121a33300beaf4248ce961f2cb7828d809a28f7def929648d2f4393a17ae9bdc44c4079663c380", 0xba}, {&(0x7f0000000780)="c901c56369eb033c3fcfbe29997d9e660dca3a56e01e581d9330083c5169da08", 0x20}, {&(0x7f00000007c0)="4aa743cc1dc9d589638add545a1f8cbb4c6b9a6f485ed3c1c4cee77f22de18c680b180baab06e5e8136f258ff93db118c503836c0e1b61bee2691063f41fe874f86b694b32b602246f514461724a44a1b726b8d93b4736c0e31819c8e70306cb74f9d44a3921a5e4f9167daff5df999f43d2c225fc009a62cc0e0b1112de48c1630a544e4f77d3169bd12d9e02680619a001a3ee21be54d24ee4e1aaf8be56daaf92b3b4a1d581a1a82bb5fe382fd4c12fa675b9f82762361e297520713a555207ce17ae7d96242212ff73d42ab6291ac6765ff567ec45e5842c432f43916859c19f55da7dccc56ae91b", 0xea}], 0x8}}, {{&(0x7f0000000940)={0xa, 0x4e23, 0x3f, @empty, 0xd3}, 0x1c, &(0x7f0000000b40)=[{&(0x7f0000000980)="112d5b663256a51445f6f27726e23539977c6868bcfbb60ef91ecdbd7f6f10b8e036197a6c6d35a5b27aa9a8d9b32aafa63bd60afed62ab1dddd1cfc35652b4d87df402c9ceb85db4daf3549ee03da0d82ad7436f804ffb0f0", 0x59}, {&(0x7f0000000a00)="df2e0f7f3fa2fca5754fd2de84e4d6c54ef23e9e0fceeb6a0f7a90969a9395f84514db84726c0b36fed9524ed850782ce2d7aa9232cbca92c618a1c3e7162eb10c92282e2ab1ef8f9d9a326a26b8c0e18e0cbb9af92d9353da03779973b6ba597951cf3c7d9c05a5aecdd7003fd6767ba282006127bd9165e3102d9b37b9e3a7e394cd0446e1943b006787160e523f2b368b5d35d3d64b71bd239629415df5b503a8cd7e926a3a9c53c7be3ccdb48e389b07ecc864fc2280f21cb897e0be1ecb", 0xc0}, {&(0x7f0000000ac0)="b3282913b03bb134f026a8b9aa014377a61ba3b7e99a8d36366a16e494ab16f2fa6ecfd454a965e4f5eb33bd3a5552f85c56c431aa06a4a917c5985678160bccaf97e637518b53248b6b3ddf672f278ce3400471e325972eeaa40496567ff9f92487223e10fa09b842af60961964532f3c", 0x71}], 0x3, &(0x7f00000020c0)=ANY=[@ANYBLOB="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"], 0x110}}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000000cc0)="654eac700aaaa99f605d2d3ce725ba951fcc5ccc7e90a1b71b8481720720ce46e9f71aabe45323105a2ad91513f3e8535a335f1c149ac71902eab33f592a62221d0c6000876a663d2f6a5d538b93677da5ceafce925afac4d6aa80a9ea090f85713ad0c3a174842c9e425655d7a6a95f4ae388c619bf337cd2c723631119634c95b29f73ff9b725b0c6acfdc04e790c621a5ca7dbb3d384dccba56427d93c441ea06502527e67ac4ce7ddcdfa582b80a9b954e18128eedfc992ce855bd679551f089127e9ae2b4e4135c767db50229e1ff4b5b84f6587ecfc0f38901aa87bf9a74", 0xe1}, {&(0x7f0000000dc0)="b0e1b61106ab321c80b94299ac2c838f47cdfe6d8c3fb189a5813188c763e4fca24fe7fb10d142196b8791a8f749e35887fda4176f34b1d6a1cb1aa5c9dd06b21f76ecf77b4c2e8817b03794de407030b7b002baf7917c", 0x57}, {&(0x7f0000000e40)="7e5491399b8f43a17d081e74ced8d787140726b463e0fa818fed606d7b585c43d617dd3ce81322c1973e19adc61b9de343d2552d1b49d82f", 0x38}, {&(0x7f0000000e80)="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", 0x1000}, {&(0x7f0000001e80)="9c74d8c84cbab436303489decebd1e8304e27b6766afcf59771b6e25187a6c1ff07f00fa66126e631d310f5dd2e9aa082ac86bf0c93ca3e4a82edaf4761f70e237a46499973de2d7824d316caab6d64b029d6b7b1fd2914483d3009d1351b2000c8b44c6270abbc74045dcf20ec98f4e337bfc71fe", 0x75}], 0x5}}], 0x3, 0x4000885) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000b80), 0xc040, 0x0) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:35:41 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c503, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:35:57 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c504, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:35:57 executing program 2: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0", 0x28, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:57 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) r1 = getpgrp(0x0) tgkill(r1, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3, 0xff, 0x3, 0x8, 0x0, 0x100000000, 0x402, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0x9, 0x0, 0x0, 0x3, 0x7, 0x4, 0x0, 0x20}, r1, 0x9, r2, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r3) r4 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000180)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000001c0)={"a2097d352b3378cc0d38de51711f07fd", r5, 0x0, {0x1, 0x1f}, {0x8, 0xffffffff}, 0x0, [0xfffffffffffffff9, 0x5330, 0x9, 0x7a, 0x101, 0xffffffff7fffffff, 0x101, 0x1, 0x9, 0x10001, 0xffffffff, 0x20, 0x4, 0x9, 0x23ff2b78, 0xffff]}) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 08:35:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYBLOB="54f0a95ee3442bc0c6a73264498b656cd00bf096ea8e4b2ceacd324a6e24d3b725bcd271c7bba3d2173b824d219d2ac756b24b63a1edb30489f3ef70e6de33fda1dc22dd6b5bf15d0c4e880cccd265a748e8a5a07da1ff8cce48f05065d970f12e9cf1da10f7a513931641d8f8ae77d1625f78888c6946a7054989cf62de43e40454ea4a3ee95fc3b6b994494074d501bedb5668efeebba16a29a8e55b5bdd94df6fb8143540a7d3a64a7c4f0c284cbf4a3aa2cf7c2fc4470028aff49287b5ddaa2e45c3c7f71bba200535209add09af8539869a774e", @ANYRES32=r1, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:35:57 executing program 4: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841", 0x1f, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:57 executing program 1: ftruncate(0xffffffffffffffff, 0x1000003) fallocate(0xffffffffffffffff, 0x3, 0x10000, 0x30000000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) syz_io_uring_setup(0x5997, &(0x7f0000000140)={0x0, 0x5ee0, 0x2, 0x3, 0x14}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) creat(0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000300)='./file1/file0\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="dbbe91ec97922ebc7fe4738bfa427abf8d0398b94140103988", 0x19, 0x10001}, {&(0x7f0000000540)="752cade346d5324e0be0cb7a7c5dea4db21c385b27d3021a3db8da2174805cbaa9a1632c15765438d62747d2c06561407884c478141f82892c147ffe2278b26eb1ed60449a168cff4352872dd6464ee051d9e59b49c5a20637a75a742699357c36427d5a09b2ab81eb3054a6487bc22d23da3de9e1972a74d94aa13a04980cf54f6734edbee3036351ad2f85a6cf84e3f53d87a83e5a546ea4024fb8a33390da64d41597905f77303370b0468d598de32ef6ffa3c4f2f8c6d95efd50d5d5c0535d35eacd04740dae67a2b70a704b38b30231574f028e99ef8b19bb7173b3aa79cbc9d6bda5c86987", 0xe8, 0x9cf}, {&(0x7f00000003c0)="ea4df6df6b39f5473ba71eead30153cbe9988fb1784e243a1a304189339841df0beb36d9a0f22cf0", 0x28, 0x7}, {&(0x7f0000000400)="2f489eb1bbe7a40a258b7031ed45a984b7361c2d", 0x14, 0x4}, {&(0x7f0000000640)="fc5575a7aa325f67693a3e5328c92bd70976902ed7b89bb7fa97e278e2885c78a20e06db13a4c4ede1f7b3692da62ff30220fe9d5598373dba4b95c6aeea5b00cc3143e70cb7d978ae09db2c0b2c527f6c374dfce339607f804fad", 0x5b, 0x6}, {&(0x7f00000006c0)="48bffa13ea7caf85e02ef0f7520ca42cc8b1ba674e7326e4c03a0415091a1c77b00faa28ef9b8f0546577e5f8c6d5347d08aa89ee242378210493b7eb2e4cb8e1e3cc8f2c0d71cb2f63fb46ffb9c1d48829c505fafba82c9d63b3a1f4ed81aa429f66bfd7e414cb5908c0c157bbfa728e2bb7f935a7eba60f9aefb42b98d2eec4061870433a4cc8d", 0x88, 0x4}], 0x801000, 0xfffffffffffffffd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x400000) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 08:35:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r2) r3 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000239120000000000000000000000000000000000000000000040000000000000000000000000004087de0e41d302d3eabe0485604ff84dac215cdbf9822740ff30de17f2a7ed910e005f801fa2823a3b50206e5533b7f3713c9e1ca0931a1382b5c398fb72f6caa8fd33c576416f970cb1ace126d7adc70d5f659f9241358f9d40315e659a493d30b89b18d90aa6856fd55e051609a48bbd3ccb5d200bf471508bb9a6ce217144292b78c99843b44df031182d39c703", @ANYRESHEX=0x0, @ANYRES32=r1, @ANYRES64=r0, @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESHEX]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 08:35:57 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) [ 2646.045206] FAULT_INJECTION: forcing a failure. [ 2646.045206] name failslab, interval 1, probability 0, space 0, times 0 [ 2646.046626] CPU: 0 PID: 45009 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2646.047355] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2646.048205] Call Trace: [ 2646.048491] dump_stack+0x107/0x167 [ 2646.048881] should_fail.cold+0x5/0xa [ 2646.049288] ? alloc_vfsmnt+0x23/0x680 [ 2646.049699] should_failslab+0x5/0x20 [ 2646.050101] kmem_cache_alloc+0x5b/0x310 [ 2646.050527] ? copy_tree+0x61a/0xa60 request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 95) [ 2646.050928] alloc_vfsmnt+0x23/0x680 [ 2646.051399] clone_mnt+0x6c/0xce0 [ 2646.051769] copy_tree+0x3b0/0xa60 [ 2646.052149] copy_mnt_ns+0x144/0xa00 [ 2646.052537] ? kmem_cache_alloc+0x2a6/0x310 [ 2646.052996] create_new_namespaces+0xd6/0xb20 [ 2646.053504] copy_namespaces+0x3fb/0x4f0 [ 2646.053936] copy_process+0x385b/0x7800 [ 2646.054345] ? mark_lock+0xf5/0x2df0 [ 2646.054824] ? lock_acquire+0x197/0x470 [ 2646.055243] ? __cleanup_sighand+0xb0/0xb0 [ 2646.055798] ? _copy_from_user+0xfb/0x1b0 [ 2646.056253] kernel_clone+0xe7/0x980 [ 2646.056718] ? lock_acquire+0x197/0x470 [ 2646.057119] ? create_io_thread+0xf0/0xf0 [ 2646.057663] ? ksys_write+0x21a/0x260 [ 2646.058075] ? lock_downgrade+0x6d0/0x6d0 [ 2646.058599] __do_sys_clone3+0x1e5/0x320 [ 2646.059013] ? __do_sys_clone+0x110/0x110 [ 2646.059547] ? rcu_read_lock_any_held+0x75/0xa0 [ 2646.060048] ? vfs_write+0x354/0xa70 [ 2646.060524] ? fput_many+0x2f/0x1a0 [ 2646.060904] ? ksys_write+0x1a9/0x260 [ 2646.061386] ? __ia32_sys_read+0xb0/0xb0 [ 2646.061833] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2646.062478] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2646.063029] ? trace_hardirqs_on+0x5b/0x180 [ 2646.063569] do_syscall_64+0x33/0x40 [ 2646.063971] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2646.064620] RIP: 0033:0x7f7f3dd15b19 [ 2646.065002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2646.067298] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2646.068066] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2646.068783] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2646.069504] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2646.070223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2646.070938] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:35:57 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 96) 08:35:57 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c505, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2646.282510] FAULT_INJECTION: forcing a failure. [ 2646.282510] name failslab, interval 1, probability 0, space 0, times 0 [ 2646.284624] CPU: 1 PID: 45128 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2646.285791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2646.287164] Call Trace: [ 2646.287599] dump_stack+0x107/0x167 [ 2646.288208] should_fail.cold+0x5/0xa [ 2646.288855] ? create_object.isra.0+0x3a/0xa20 [ 2646.289612] should_failslab+0x5/0x20 [ 2646.290247] kmem_cache_alloc+0x5b/0x310 [ 2646.290933] ? find_held_lock+0x2c/0x110 [ 2646.291597] create_object.isra.0+0x3a/0xa20 [ 2646.292331] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2646.293168] kmem_cache_alloc+0x159/0x310 [ 2646.293880] alloc_vfsmnt+0x23/0x680 [ 2646.294490] clone_mnt+0x6c/0xce0 [ 2646.295085] copy_tree+0x3b0/0xa60 [ 2646.295673] copy_mnt_ns+0x144/0xa00 [ 2646.296299] ? kmem_cache_alloc+0x2a6/0x310 [ 2646.297020] create_new_namespaces+0xd6/0xb20 [ 2646.297787] copy_namespaces+0x3fb/0x4f0 [ 2646.298457] copy_process+0x385b/0x7800 [ 2646.299129] ? mark_lock+0xf5/0x2df0 [ 2646.299747] ? lock_acquire+0x197/0x470 [ 2646.300420] ? __cleanup_sighand+0xb0/0xb0 [ 2646.301132] ? _copy_from_user+0xfb/0x1b0 [ 2646.301845] kernel_clone+0xe7/0x980 [ 2646.302450] ? lock_acquire+0x197/0x470 [ 2646.303122] ? create_io_thread+0xf0/0xf0 [ 2646.303823] ? ksys_write+0x21a/0x260 [ 2646.304441] ? lock_downgrade+0x6d0/0x6d0 [ 2646.305133] __do_sys_clone3+0x1e5/0x320 [ 2646.305825] ? __do_sys_clone+0x110/0x110 [ 2646.306516] ? rcu_read_lock_any_held+0x75/0xa0 [ 2646.307295] ? vfs_write+0x354/0xa70 [ 2646.307918] ? fput_many+0x2f/0x1a0 [ 2646.308508] ? ksys_write+0x1a9/0x260 [ 2646.309140] ? __ia32_sys_read+0xb0/0xb0 [ 2646.309834] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2646.310681] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2646.311532] ? trace_hardirqs_on+0x5b/0x180 [ 2646.312254] do_syscall_64+0x33/0x40 [ 2646.312871] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2646.313708] RIP: 0033:0x7f7f3dd15b19 [ 2646.314333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2646.317355] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2646.318597] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2646.319783] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2646.320949] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2646.322125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2646.323298] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 08:35:57 executing program 6: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) clone3(&(0x7f0000000ac0)={0x17412c506, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:35:57 executing program 3: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000680)=ANY=[@ANYBLOB="020000000000000001020b0405060708090a0b0c0d0e0f101112131415161718191a1bc4451e1f202122232425262728292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000ea145ccdc864c3c88cf346a2ff3b66416b74ce11e03ecc8169d850373409d537d51389082fdac528dd4ce24c4b18f86bcc7ab8b343381ea6ecccdc8e5d99cd72d7f30dbd4dd1dae75b424eab337243c68c3ea1194205da461a205baa76b40738c3a601987b1375cadacbfaf1da5074bee8c10418058e71bb8c327b71ae4385617c75293792c33e5fc30af016315bfd"], 0x48, r0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 97) [ 2646.571946] FAULT_INJECTION: forcing a failure. [ 2646.571946] name failslab, interval 1, probability 0, space 0, times 0 [ 2646.573311] CPU: 0 PID: 45260 Comm: syz-executor.3 Not tainted 5.10.211 #1 [ 2646.574007] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2646.574827] Call Trace: [ 2646.575099] dump_stack+0x107/0x167 [ 2646.575471] should_fail.cold+0x5/0xa [ 2646.575865] should_failslab+0x5/0x20 [ 2646.576250] __kmalloc_track_caller+0x79/0x370 [ 2646.576712] ? kstrdup_const+0x53/0x80 [ 2646.577115] kstrdup+0x36/0x70 [ 2646.577447] kstrdup_const+0x53/0x80 [ 2646.577825] alloc_vfsmnt+0xb5/0x680 [ 2646.578141] clone_mnt+0x6c/0xce0 [ 2646.578505] copy_tree+0x3b0/0xa60 [ 2646.578816] copy_mnt_ns+0x144/0xa00 [ 2646.579195] ? kmem_cache_alloc+0x2a6/0x310 [ 2646.579570] create_new_namespaces+0xd6/0xb20 [ 2646.580026] copy_namespaces+0x3fb/0x4f0 [ 2646.580395] copy_process+0x385b/0x7800 [ 2646.580800] ? mark_lock+0xf5/0x2df0 [ 2646.581133] ? lock_acquire+0x197/0x470 [ 2646.581559] ? __cleanup_sighand+0xb0/0xb0 [ 2646.582004] ? _copy_from_user+0xfb/0x1b0 [ 2646.582433] kernel_clone+0xe7/0x980 [ 2646.582813] ? lock_acquire+0x197/0x470 [ 2646.583165] ? create_io_thread+0xf0/0xf0 [ 2646.583599] ? ksys_write+0x21a/0x260 [ 2646.583922] ? lock_downgrade+0x6d0/0x6d0 [ 2646.584298] __do_sys_clone3+0x1e5/0x320 [ 2646.584639] ? __do_sys_clone+0x110/0x110 [ 2646.585005] ? rcu_read_lock_any_held+0x75/0xa0 [ 2646.585411] ? vfs_write+0x354/0xa70 [ 2646.585725] ? fput_many+0x2f/0x1a0 [ 2646.586033] ? ksys_write+0x1a9/0x260 [ 2646.586358] ? __ia32_sys_read+0xb0/0xb0 [ 2646.586704] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2646.587151] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2646.587577] ? trace_hardirqs_on+0x5b/0x180 [ 2646.587946] do_syscall_64+0x33/0x40 [ 2646.588272] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2646.588694] RIP: 0033:0x7f7f3dd15b19 [ 2646.589071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2646.590596] RSP: 002b:00007f7f3b28b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2646.591360] RAX: ffffffffffffffda RBX: 00007f7f3de28f60 RCX: 00007f7f3dd15b19 [ 2646.592078] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ac0 [ 2646.592787] RBP: 00007f7f3b28b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2646.593508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2646.594220] R13: 00007ffc2648833f R14: 00007f7f3b28b300 R15: 0000000000022000 VM DIAGNOSIS: 08:40:57 Registers: info registers vcpu 0 RAX=ffffffff83e659a0 RBX=0000000000000000 RCX=ffffffff83e4d78c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e65fa8 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85673988 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e659ae RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055fe58347678 CR3=000000001826e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=798d4f08f8800b17ed20f95ca2c27b0a XMM02=3c9af54b7a51039aa00450df02fb9848 XMM03=1550ef1b46b231bf88f44ae9d87f71db XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=0e0d0c0f0a09080b0605040702010003 XMM08=ee932811278b15c53168cfbd8564edf1 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e659a0 RBX=0000000000000001 RCX=ffffffff83e4d78c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e65fa8 RBP=ffffed1001130000 RSP=ffff88800898fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85673988 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e659ae RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007facff69c010 CR3=000000001b83e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000006000000040000000000000000 XMM02=73616d7320636578650a0a0100010101 XMM03=651100736465657320636578650a0068 XMM04=737472617473657220726f7475636578 XMM05=6574616469646e616320636578650e00 XMM06=6578650b007a7a756620636578650900 XMM07=6d20636578650d006567616972742063 XMM08=65657320636578650a006873616d7320 XMM09=73657220726f74756365786511007364 XMM10=646e616320636578650e007374726174 XMM11=7a7a7566206365786509006574616469 XMM12=650d0065676169727420636578650b00 XMM13=78650a00657a696d696e696d20636578 XMM14=7420636578650a0073746e6968206365 XMM15=00006e6567206365786508006c61746f